Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-34918 (GCVE-0-2022-34918)
Vulnerability from cvelistv5
Published
2022-07-04 20:07
Modified
2024-08-03 09:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.749Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "name": "[oss-security] 20220705 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "name": "DSA-5191", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5191" }, { "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-28T16:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "name": "[oss-security] 20220705 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "name": "DSA-5191", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5191" }, { "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-34918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "name": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u", "refsource": "MISC", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u" }, { "name": "https://www.openwall.com/lists/oss-security/2022/07/02/3", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "name": "[oss-security] 20220705 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "name": "https://www.randorisec.fr/crack-linux-firewall/", "refsource": "MISC", "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "name": "DSA-5191", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5191" }, { "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "name": "https://security.netapp.com/advisory/ntap-20220826-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "name": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "name": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-34918", "datePublished": "2022-07-04T20:07:32", "dateReserved": "2022-07-04T00:00:00", "dateUpdated": "2024-08-03T09:22:10.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-34918\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-07-04T21:15:07.730\",\"lastModified\":\"2024-11-21T07:10:26.080\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en el kernel de Linux versiones hasta 5.18.9. Un error de confusi\u00f3n de tipos en la funci\u00f3n nft_set_elem_init (conllevando a un desbordamiento del b\u00fafer) podr\u00eda ser usado por un atacante local para escalar privilegios, una vulnerabilidad diferente a la de CVE-2022-32250. (El atacante puede obtener acceso de root, pero debe comenzar con un espacio de nombres de usuario no privilegiado para obtener acceso CAP_NET_ADMIN). Esto puede corregirse en la funci\u00f3n nft_setelem_parse_data en el archivo net/netfilter/nf_tables_api.c\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-843\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1\",\"versionEndExcluding\":\"4.14.316\",\"matchCriteriaId\":\"708B805D-F1B9-410C-8231-CD62F16F5739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.284\",\"matchCriteriaId\":\"9112EE64-11F4-46DB-A041-95118F20F81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.244\",\"matchCriteriaId\":\"79F47095-8BA3-495A-AED3-2CCA5F2838E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.130\",\"matchCriteriaId\":\"8BF24898-7C80-443F-93F3-F82029BBFF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.54\",\"matchCriteriaId\":\"B2197EF1-3D9C-4EBA-9F94-6C8668E719B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"5.18.11\",\"matchCriteriaId\":\"622F881E-3317-4653-9558-86008C2FBFD2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"902B8056-9E37-443B-8905-8AA93E2447FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"359012F1-2C63-415A-88B8-6726A87830DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/05/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/06/5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220826-0004/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5191\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2022/07/02/3\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.randorisec.fr/crack-linux-firewall/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/07/05/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/06/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20220826-0004/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5191\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openwall.com/lists/oss-security/2022/07/02/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.randorisec.fr/crack-linux-firewall/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}" } }
suse-su-2022:2424-2
Vulnerability from csaf_suse
Published
2022-07-18 06:45
Modified
2022-07-18 06:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
The following non-security bugs were fixed:
- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)
- Add various fsctl structs (bsc#1200217).
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx->dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS
- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)
- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: fix snapshot mount option (bsc#1200217).
- [smb3] improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
Patchnames
SUSE-2022-2424,openSUSE-Leap-Micro-5.2-2022-2424
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add various fsctl structs (bsc#1200217).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)\n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS\n- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)\n- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: fix snapshot mount option (bsc#1200217).\n- [smb3] improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2424,openSUSE-Leap-Micro-5.2-2022-2424", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2424-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2424-2", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222424-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2424-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1179195", "url": "https://bugzilla.suse.com/1179195" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1185762", "url": "https://bugzilla.suse.com/1185762" }, { "category": "self", "summary": "SUSE Bug 1192761", "url": "https://bugzilla.suse.com/1192761" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1194013", "url": "https://bugzilla.suse.com/1194013" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198924", "url": "https://bugzilla.suse.com/1198924" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199489", "url": "https://bugzilla.suse.com/1199489" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1200217", "url": "https://bugzilla.suse.com/1200217" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200622", "url": "https://bugzilla.suse.com/1200622" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201143", "url": "https://bugzilla.suse.com/1201143" }, { "category": "self", "summary": "SUSE Bug 1201147", "url": "https://bugzilla.suse.com/1201147" }, { "category": "self", "summary": "SUSE Bug 1201149", "url": "https://bugzilla.suse.com/1201149" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4157 page", "url": "https://www.suse.com/security/cve/CVE-2021-4157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-18T06:45:44Z", "generator": { "date": "2022-07-18T06:45:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2424-2", "initial_release_date": "2022-07-18T06:45:44Z", "revision_history": [ { "date": "2022-07-18T06:45:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.96.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.96.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.96.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.96.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.96.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.96.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap Micro 5.2", "product": { "name": "openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-4157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4157" } ], "notes": [ { "category": "general", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4157", "url": "https://www.suse.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "SUSE Bug 1194013 for CVE-2021-4157", "url": "https://bugzilla.suse.com/1194013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2021-4157" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:44Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2696-1
Vulnerability from csaf_suse
Published
2022-08-08 18:56
Modified
2022-08-08 18:56
Summary
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_71 fixes several issues.
The following security issues were fixed:
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2696,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2695,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2696
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_71 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2696,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2695,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2696", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2696-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2696-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222696-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2696-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-08T18:56:24Z", "generator": { "date": "2022-08-08T18:56:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2696-1", "initial_release_date": "2022-08-08T18:56:24Z", "revision_history": [ { "date": "2022-08-08T18:56:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_71-preempt-4-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_71-preempt-4-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_71-preempt-4-150300.2.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-08T18:56:24Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-08T18:56:24Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_71-default-4-150300.2.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_76-default-3-150300.2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-08T18:56:24Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2732-1
Vulnerability from csaf_suse
Published
2022-08-09 19:33
Modified
2022-08-09 19:33
Summary
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_63 fixes several issues.
The following security issues were fixed:
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2732,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2732
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_63 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2732,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2732", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2732-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2732-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222732-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2732-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-09T19:33:52Z", "generator": { "date": "2022-08-09T19:33:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2732-1", "initial_release_date": "2022-08-09T19:33:52Z", "revision_history": [ { "date": "2022-08-09T19:33:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_63-preempt-6-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_63-preempt-6-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_63-preempt-6-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:52Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:52Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_63-default-6-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:52Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2549-1
Vulnerability from csaf_suse
Published
2022-07-26 11:58
Modified
2022-07-26 11:58
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
The following non-security bugs were fixed:
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx->dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).
- smb3: fix snapshot mount option (bsc#1200217).
- smb3 improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).
- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
- x86/entry: Remove skip_r11rcx (bsc#1201644).
Patchnames
SUSE-2022-2549,SUSE-SLE-Module-Basesystem-15-SP3-2022-2549,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2549,SUSE-SLE-Module-Legacy-15-SP3-2022-2549,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2549,SUSE-SLE-Product-HA-15-SP3-2022-2549,SUSE-SLE-Product-WE-15-SP3-2022-2549,SUSE-SUSE-MicroOS-5.1-2022-2549,SUSE-SUSE-MicroOS-5.2-2022-2549,openSUSE-SLE-15.3-2022-2549,openSUSE-SLE-15.4-2022-2549
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762) \n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).\n- smb3: fix snapshot mount option (bsc#1200217).\n- smb3 improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).\n- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n- x86/entry: Remove skip_r11rcx (bsc#1201644).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2549,SUSE-SLE-Module-Basesystem-15-SP3-2022-2549,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2549,SUSE-SLE-Module-Legacy-15-SP3-2022-2549,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2549,SUSE-SLE-Product-HA-15-SP3-2022-2549,SUSE-SLE-Product-WE-15-SP3-2022-2549,SUSE-SUSE-MicroOS-5.1-2022-2549,SUSE-SUSE-MicroOS-5.2-2022-2549,openSUSE-SLE-15.3-2022-2549,openSUSE-SLE-15.4-2022-2549", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2549-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2549-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222549-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2549-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1179195", "url": "https://bugzilla.suse.com/1179195" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1185762", "url": "https://bugzilla.suse.com/1185762" }, { "category": "self", "summary": "SUSE Bug 1192761", "url": "https://bugzilla.suse.com/1192761" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1194013", "url": "https://bugzilla.suse.com/1194013" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198924", "url": "https://bugzilla.suse.com/1198924" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199489", "url": "https://bugzilla.suse.com/1199489" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1200217", "url": "https://bugzilla.suse.com/1200217" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200604", "url": "https://bugzilla.suse.com/1200604" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200622", "url": "https://bugzilla.suse.com/1200622" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201143", "url": "https://bugzilla.suse.com/1201143" }, { "category": "self", "summary": "SUSE Bug 1201147", "url": "https://bugzilla.suse.com/1201147" }, { "category": "self", "summary": "SUSE Bug 1201149", "url": "https://bugzilla.suse.com/1201149" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201644", "url": "https://bugzilla.suse.com/1201644" }, { "category": "self", "summary": "SUSE Bug 1201664", "url": "https://bugzilla.suse.com/1201664" }, { "category": "self", "summary": "SUSE Bug 1201672", "url": "https://bugzilla.suse.com/1201672" }, { "category": "self", "summary": "SUSE Bug 1201673", "url": "https://bugzilla.suse.com/1201673" }, { "category": "self", "summary": "SUSE Bug 1201676", "url": "https://bugzilla.suse.com/1201676" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4157 page", "url": "https://www.suse.com/security/cve/CVE-2021-4157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-26T11:58:49Z", "generator": { "date": "2022-07-26T11:58:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2549-1", "initial_release_date": "2022-07-26T11:58:49Z", "revision_history": [ { "date": "2022-07-26T11:58:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-al-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-al-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-altera-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-altera-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-amd-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-amd-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-apm-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-apm-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-arm-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-arm-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-cavium-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-exynos-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-freescale-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-lg-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-lg-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-marvell-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-qcom-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-renesas-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-socionext-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-sprd-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-5.3.18-150300.59.87.1.aarch64", "product": { "name": "dtb-zte-5.3.18-150300.59.87.1.aarch64", "product_id": "dtb-zte-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-syms-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-syms-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-devel-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-devel-5.3.18-150300.59.87.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-docs-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-docs-5.3.18-150300.59.87.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-docs-html-5.3.18-150300.59.87.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-macros-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-macros-5.3.18-150300.59.87.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-source-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-source-5.3.18-150300.59.87.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-debug-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le", "product_id": "kernel-syms-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-devel-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-extra-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-default-optional-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-obs-build-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-syms-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-syms-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-debug-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-debug-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-syms-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-syms-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-al-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-al-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-altera-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-altera-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amd-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-amd-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apm-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-apm-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-arm-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-arm-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-cavium-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-exynos-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-freescale-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-lg-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-lg-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-marvell-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-qcom-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-renesas-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-socionext-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-sprd-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-zte-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-zte-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-debug-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-debug-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-devel-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-docs-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-docs-html-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-macros-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-source-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-al-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-al-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-zte-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "dtb-zte-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-4157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4157" } ], "notes": [ { "category": "general", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4157", "url": "https://www.suse.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "SUSE Bug 1194013 for CVE-2021-4157", "url": "https://bugzilla.suse.com/1194013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2021-4157" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x", "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x", "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:58:49Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2766-1
Vulnerability from csaf_suse
Published
2022-08-10 13:04
Modified
2022-08-10 13:04
Summary
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-59_27 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2766,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2766
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-59_27 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830) \n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2766,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2766", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2766-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2766-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222766-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2766-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201656", "url": "https://bugzilla.suse.com/1201656" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-10T13:04:33Z", "generator": { "date": "2022-08-10T13:04:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2766-1", "initial_release_date": "2022-08-10T13:04:33Z", "revision_history": [ { "date": "2022-08-10T13:04:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_27-preempt-15-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_27-preempt-15-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_27-preempt-15-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_27-default-15-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T13:04:33Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2854-1
Vulnerability from csaf_suse
Published
2022-08-19 14:04
Modified
2022-08-19 14:04
Summary
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)
Description of the patch
This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
Patchnames
SUSE-2022-2854,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2854
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.14.21-150400_22 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830) \n- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2854,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2854", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2854-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2854-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222854-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2854-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" }, { "category": "self", "summary": "SUSE Bug 1199606", "url": "https://bugzilla.suse.com/1199606" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201629", "url": "https://bugzilla.suse.com/1201629" }, { "category": "self", "summary": "SUSE Bug 1201656", "url": "https://bugzilla.suse.com/1201656" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1734 page", "url": "https://www.suse.com/security/cve/CVE-2022-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33743 page", "url": "https://www.suse.com/security/cve/CVE-2022-33743/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP4)", "tracking": { "current_release_date": "2022-08-19T14:04:39Z", "generator": { "date": "2022-08-19T14:04:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2854-1", "initial_release_date": "2022-08-19T14:04:39Z", "revision_history": [ { "date": "2022-08-19T14:04:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "product_id": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "product": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "product_id": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64", "product_id": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1734" } ], "notes": [ { "category": "general", "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1734", "url": "https://www.suse.com/security/cve/CVE-2022-1734" }, { "category": "external", "summary": "SUSE Bug 1199605 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199605" }, { "category": "external", "summary": "SUSE Bug 1199606 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199606" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-1734" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-33743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33743" } ], "notes": [ { "category": "general", "text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33743", "url": "https://www.suse.com/security/cve/CVE-2022-33743" }, { "category": "external", "summary": "SUSE Bug 1200763 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1200763" }, { "category": "external", "summary": "SUSE Bug 1201629 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1201629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-33743" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_22-default-4-150400.4.9.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-19T14:04:39Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2727-1
Vulnerability from csaf_suse
Published
2022-08-09 17:05
Modified
2022-08-09 17:05
Summary
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_60 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2727,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2727
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_60 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2727,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2727", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2727-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2727-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222727-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2727-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-09T17:05:01Z", "generator": { "date": "2022-08-09T17:05:01Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2727-1", "initial_release_date": "2022-08-09T17:05:01Z", "revision_history": [ { "date": "2022-08-09T17:05:01Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_60-preempt-9-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_60-preempt-9-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_60-preempt-9-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T17:05:01Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T17:05:01Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T17:05:01Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T17:05:01Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_60-default-9-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T17:05:01Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2770-1
Vulnerability from csaf_suse
Published
2022-08-10 18:34
Modified
2022-08-10 18:34
Summary
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-59_37 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2770,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2768,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2769,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2770,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2773
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-59_37 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830) \n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2770,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2768,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2769,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2770,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2773", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2770-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2770-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222770-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2770-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201656", "url": "https://bugzilla.suse.com/1201656" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-10T18:34:24Z", "generator": { "date": "2022-08-10T18:34:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2770-1", "initial_release_date": "2022-08-10T18:34:24Z", "revision_history": [ { "date": "2022-08-10T18:34:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_34-preempt-14-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_34-preempt-14-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_34-preempt-14-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_19-default-17-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_24-default-15-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-14-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_37-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T18:34:24Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2738-1
Vulnerability from csaf_suse
Published
2022-08-10 05:04
Modified
2022-08-10 05:04
Summary
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-59_40 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2738,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2738
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-59_40 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830) \n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2738,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2738", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2738-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2738-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222738-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2738-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201656", "url": "https://bugzilla.suse.com/1201656" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-10T05:04:30Z", "generator": { "date": "2022-08-10T05:04:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2738-1", "initial_release_date": "2022-08-10T05:04:30Z", "revision_history": [ { "date": "2022-08-10T05:04:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-59_40-preempt-13-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-59_40-preempt-13-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-59_40-preempt-13-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_40-default-13-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T05:04:30Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2520-1
Vulnerability from csaf_suse
Published
2022-07-21 16:35
Modified
2022-07-21 16:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bnc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bnc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-1998: Fixed a use after free in the file system notify functionality (bnc#1200284).
- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)
- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)
- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)
- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)
- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)
- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)
- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)
- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)
- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)
- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)
- CVE-2022-0264: Fixed a vulnerability in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)
- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).
- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
The following non-security bugs were fixed:
- ACPI: APEI: fix return value of __setup handlers (git-fixes).
- ACPI/APEI: Limit printable size of BERT table data (git-fixes).
- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).
- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).
- ACPICA: Avoid cache flush inside virtual machines (git-fixes).
- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).
- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).
- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).
- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).
- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).
- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).
- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).
- ACPI: PM: Revert 'Only mark EC GPE for wakeup on Intel systems' (git-fixes).
- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).
- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).
- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).
- ACPI: processor idle: Check for architectural support for LPI (git-fixes).
- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).
- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).
- ACPI: property: Release subnode properties with data nodes (git-fixes).
- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).
- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).
- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).
- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).
- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).
- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).
- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).
- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).
- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).
- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).
- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).
- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).
- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).
- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).
- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).
- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).
- ALSA: hda: Fix driver index handling at re-binding (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).
- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).
- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).
- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).
- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).
- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).
- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).
- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).
- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).
- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).
- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).
- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).
- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).
- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Set max DMA segment size (git-fixes).
- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).
- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).
- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).
- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).
- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).
- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).
- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).
- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).
- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).
- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).
- ALSA: pcm: Test for 'silence' field in struct 'pcm_format_data' (git-fixes).
- ALSA: spi: Add check for clk_enable() (git-fixes).
- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).
- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).
- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).
- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).
- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).
- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).
- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).
- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).
- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).
- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- ALSA: usb-audio: Increase max buffer size (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).
- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).
- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).
- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).
- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).
- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).
- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).
- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).
- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).
- ALSA: wavefront: Proper check of get_user() error (git-fixes).
- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).
- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).
- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).
- amd/display: set backlight only if required (git-fixes).
- arch/arm64: Fix topology initialization for core scheduling (git-fixes).
- arm64: Add Cortex-A510 CPU part definition (git-fixes).
- arm64: Add part number for Arm Cortex-A78AE (git-fixes).
- arm64: Add support for user sub-page fault probing (git-fixes)
- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).
- arm64: avoid fixmap race condition when create pud mapping (git-fixes).
- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).
- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).
- arm64: defconfig: build imx-sdma as a module (git-fixes).
- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).
- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).
- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).
- arm64: dts: agilex: use the compatible 'intel,socfpga-agilex-hsotg' (git-fixes).
- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).
- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).
- arm64: dts: broadcom: Fix sata nodename (git-fixes).
- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).
- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)
- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).
- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)
- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)
- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).
- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 & mmc settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).
- arm64: dts: imx8mq: fix lcdif port node (git-fixes).
- arm64: dts: imx8qm: Correct SCU clock controller's compatible (git-fixes)
- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).
- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).
- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).
- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).
- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).
- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).
- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).
- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).
- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).
- arm64: dts: meson-g12b-odroid-n2: fix typo 'dio2133' (git-fixes).
- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).
- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).
- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).
- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).
- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).
- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).
- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).
- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).
- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).
- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).
- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).
- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).
- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).
- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).
- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).
- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).
- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).
- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).
- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).
- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel's vddio-supply property (git-fixes).
- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).
- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).
- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).
- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).
- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).
- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).
- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).
- arm64: dts: renesas: Fix thermal bindings (git-fixes).
- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).
- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).
- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).
- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- arm64: dts: ti: j7200-main: Fix 'dtbs_check' serdes_ln_ctrl node (git-fixes).
- arm64: dts: ti: j721e-main: Fix 'dtbs_check' in serdes_ln_ctrl node (git-fixes).
- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).
- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).
- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).
- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).
- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)
- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).
- arm64: fix types in copy_highpage() (git-fixes).
- arm64: ftrace: consistently handle PLTs (git-fixes).
- arm64: ftrace: fix branch range checks (git-fixes).
- arm64: kasan: fix include error in MTE functions (git-fixes).
- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).
- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)
- arm64: mm: Drop 'const' from conditional arm64_dma_phys_limit definition (git-fixes).
- arm64: mm: fix p?d_leaf() (git-fixes).
- arm64: module: remove (NOLOAD) from linker script (git-fixes).
- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).
- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).
- arm64: patch_text: Fixup last cpu should be master (git-fixes).
- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: stackleak: fix current_top_of_stack() (git-fixes).
- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)
- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).
- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).
- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module
- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).
- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).
- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).
- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).
- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).
- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).
- ARM: at91: pm: use proper compatible for sama5d2's rtc (git-fixes).
- ARM: at91: pm: use proper compatibles for sam9x60's rtc and rtt (git-fixes).
- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).
- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).
- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).
- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).
- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).
- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).
- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).
- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).
- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).
- ARM: dts: aspeed: Add secure boot controller node (git-fixes).
- ARM: dts: aspeed: Add video engine to g6 (git-fixes).
- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).
- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).
- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).
- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).
- ARM: dts: at91: fix pinctrl phandles (git-fixes).
- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).
- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).
- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).
- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).
- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).
- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).
- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).
- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).
- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).
- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).
- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).
- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).
- ARM: dts: BCM5301X: update CRU block description (git-fixes).
- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).
- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).
- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).
- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).
- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).
- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).
- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).
- ARM: dts: Fix boot regression on Skomer (git-fixes).
- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).
- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).
- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).
- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).
- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).
- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).
- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).
- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).
- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).
- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).
- ARM: dts: imx7ulp: Fix 'assigned-clocks-parents' typo (git-fixes).
- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).
- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)
- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).
- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).
- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).
- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).
- ARM: dts: meson: Fix the UART compatible strings (git-fixes).
- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).
- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).
- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).
- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).
- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).
- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).
- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).
- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).
- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).
- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).
- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).
- ARM: dts: socfpga: change qspi to 'intel,socfpga-qspi' (git-fixes).
- ARM: dts: spear1340: Update serial node properties (git-fixes).
- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).
- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).
- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).
- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).
- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).
- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).
- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).
- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).
- ARM: fix build warning in proc-v7-bugs.c (git-fixes).
- ARM: fix co-processor register typo (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).
- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).
- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).
- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).
- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).
- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).
- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).
- ARM: mediatek: select arch timer for mt7629 (git-fixes).
- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).
- ARM: mmp: Fix failure to remove sram device (git-fixes).
- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).
- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).
- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).
- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).
- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).
- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).
- ARM: pxa: maybe fix gpio lookup tables (git-fixes).
- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).
- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).
- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).
- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).
- ASoC: amd: Fix reference to PCM buffer address (git-fixes).
- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).
- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).
- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).
- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).
- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).
- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).
- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).
- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).
- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).
- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).
- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).
- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).
- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).
- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).
- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).
- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).
- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).
- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).
- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).
- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: fsi: Add check for clk_enable (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).
- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).
- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).
- ASoC: fsl: Use dev_err_probe() helper (git-fixes).
- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).
- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).
- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).
- ASoC: intel: skylake: Set max DMA segment size (git-fixes).
- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).
- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13' (git-fixes).
- ASoC: madera: Add dependencies on MFD (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).
- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).
- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).
- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).
- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).
- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).
- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).
- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).
- ASoC: mediatek: use of_device_get_match_data() (git-fixes).
- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).
- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).
- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).
- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).
- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).
- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).
- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).
- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).
- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).
- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).
- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).
- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).
- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).
- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).
- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).
- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).
- ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes).
- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).
- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).
- ASoC: samsung: Use dev_err_probe() helper (git-fixes).
- ASoC: simple-card: fix probe failure on platform component (git-fixes).
- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).
- ASoC: soc-compress: Change the check for codec_dai (git-fixes).
- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).
- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).
- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).
- ASoC: soc-ops: fix error handling (git-fixes).
- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).
- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).
- ASoC: SOF: hda: Set max DMA segment size (git-fixes).
- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).
- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).
- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).
- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).
- ASoC: SOF: topology: remove redundant code (git-fixes).
- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).
- ASoC: tas2770: Insert post reset delay (git-fixes).
- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).
- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).
- ASoC: topology: Allow TLV control to be either read or write (git-fixes).
- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).
- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).
- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).
- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).
- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).
- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect (git-fixes).
- asus-wmi: Add dgpu disable method (bsc#1198058).
- asus-wmi: Add egpu enable method (bsc#1198058).
- asus-wmi: Add panel overdrive functionality (bsc#1198058).
- asus-wmi: Add support for platform_profile (bsc#1198058).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ata: pata_hpt37x: fix PCI clock detection (git-fixes).
- ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes).
- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).
- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).
- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).
- ath11k: acquire ab->base_lock in unassign when finding the peer by addr (git-fixes).
- ath11k: disable spectral scan during spectral deinit (git-fixes).
- ath11k: Do not check arvif->is_started before sending management frames (git-fixes).
- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).
- ath11k: mhi: use mhi_sync_power_up() (git-fixes).
- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).
- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).
- ath9k: fix ar9003_get_eepmisc (git-fixes).
- ath9k: fix QCA9561 PA bias level (git-fixes).
- ath9k: Fix usage of driver-private space in tx_info (git-fixes).
- ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix (git-fixes).
- ath9k_htc: fix uninit value bugs (git-fixes).
- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).
- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).
- atm: eni: Add check for dma_map_single (git-fixes).
- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).
- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).
- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).
- audit: improve audit queue handling when 'audit=1' on cmdline (git-fixes).
- audit: improve robustness of the audit queue handling (git-fixes).
- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).
- auxdisplay: lcd2s: Fix memory leak in ->remove() (git-fixes).
- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- b43: Fix assigning negative value to unsigned variable (git-fixes).
- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).
- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bfq: Allow current waker to defend against a tentative one (bsc#1195915).
- bfq: Avoid false marking of bic as stably merged (bsc#1197926).
- bfq: Avoid merging queues with different parents (bsc#1197926).
- bfq: Do not let waker requests skip proper accounting (bsc#1184318).
- bfq: Drop pointless unlock-lock pair (bsc#1197926).
- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).
- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).
- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).
- bfq: Limit waker detection in time (bsc#1184318).
- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).
- bfq: Relax waker detection for shared queues (bsc#1184318).
- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).
- bfq: Split shared queues on move between cgroups (bsc#1197926).
- bfq: Store full bitmap depth in bfq_data (bsc#1184318).
- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).
- bfq: Track whether bfq_group is still online (bsc#1197926).
- bfq: Update cgroup information before merging bio (bsc#1197926).
- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).
- bitfield: add explicit inclusions to the example (git-fixes).
- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).
- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).
- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).
- blk-mq: do not touch ->tagset in blk_mq_get_sq_hctx (bsc#1200824).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: fix tag_get wait task can't be awakened (bsc#1200263).
- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).
- blktrace: fix use after free for struct blk_trace (bsc#1198017).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).
- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).
- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).
- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).
- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).
- block: do not delete queue kobject before its children (bsc#1198019).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).
- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).
- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).
- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).
- block: Fix up kabi after blkcg merge fix (bsc#1198020).
- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).
- block: limit request dispatch loop duration (bsc#1198022).
- block/mq-deadline: Improve request accounting further (bsc#1198009).
- block: Provide blk_mq_sched_get_icq() (bsc#1184318).
- block: update io_ticks when io hang (bsc#1197817).
- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).
- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).
- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).
- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).
- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).
- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).
- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).
- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).
- Bluetooth: Fix the creation of hdev->name (git-fixes).
- Bluetooth: Fix use after free in hci_send_acl (git-fixes).
- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).
- Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes).
- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).
- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).
- Bluetooth: use memset avoid memory leaks (git-fixes).
- bnx2x: fix napi API usage sequence (bsc#1198217).
- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).
- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).
- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).
- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).
- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).
- bnxt_en: Increase firmware message response DMA wait time (git-fixes).
- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).
- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).
- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).
- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).
- bonding: fix data-races around agg_select_timer (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Add check_func_arg_reg_off function (git-fixes).
- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).
- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).
- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).
- bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg (git-fixes).
- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).
- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).
- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).
- bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes).
- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#1198585).
- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).
- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).
- bpftool: Fix memory leak in prog_dump() (git-fixes).
- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).
- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).
- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).
- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).
- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).
- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).
- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).
- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).
- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).
- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).
- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).
- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).
- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).
- btrfs: add ro compat flags to inodes (bsc#1197915).
- btrfs: always update the logged transaction when logging new names (bsc#1197915).
- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).
- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).
- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).
- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).
- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)
- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).
- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).
- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).
- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).
- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).
- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).
- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).
- btrfs: constify and cleanup variables in comparators (bsc#1197915).
- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).
- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).
- btrfs: do not pin logs too early during renames (bsc#1197915).
- btrfs: drop the _nr from the item helpers (bsc#1197915).
- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).
- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).
- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).
- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).
- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).
- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).
- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).
- btrfs: improve the batch insertion of delayed items (bsc#1197915).
- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).
- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).
- btrfs: introduce item_nr token variant helpers (bsc#1197915).
- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).
- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).
- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).
- btrfs: only copy dir index keys when logging a directory (bsc#1197915).
- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).
- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).
- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).
- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).
- btrfs: remove root argument from add_link() (bsc#1197915).
- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).
- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).
- btrfs: remove root argument from check_item_in_log() (bsc#1197915).
- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).
- btrfs: remove the btrfs_item_end() helper (bsc#1197915).
- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).
- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).
- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).
- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).
- btrfs: unexport setup_items_for_insert() (bsc#1197915).
- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).
- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).
- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).
- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots > nritems (bsc#1197915).
- btrfs: use single bulk copy operations when logging directories (bsc#1197915).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).
- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).
- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: etas_es58x: change opened_channel_cnt's type from atomic_t to u8 (git-fixes).
- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).
- can: grcan: grcan_close(): fix deadlock (git-fixes).
- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).
- can: grcan: only use the NAPI poll budget for RX (git-fixes).
- can: grcan: use ofdev->dev when allocating DMA memory (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).
- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).
- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).
- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).
- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).
- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).
- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).
- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).
- can: mcba_usb: properly check endpoint type (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).
- can: mcp251xfd: silence clang's -Wunaligned-access warning (git-fixes).
- can: rcar_canfd: add __maybe_unused annotation to silence warning (git-fixes).
- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).
- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: xilinx_can: mark bit timing constants as const (git-fixes).
- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).
- carl9170: tx: fix an incorrect use of list iterator (git-fixes).
- CDC-NCM: avoid overflow in sanity checking (git-fixes).
- ceph: fix setting of xattrs on async created inodes (bsc#1199611).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).
- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).
- cfg80211: fix race in netlink owner interface destruction (git-fixes).
- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).
- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).
- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).
- cifs: avoid parallel session setups on same channel (bsc#1193629).
- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).
- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).
- cifs: call helper functions for marking channels for reconnect (bsc#1193629).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).
- cifs: check for smb1 in open_cached_dir() (bsc#1193629).
- cifs: check reconnects for channels of active tcons too (bsc#1193629).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).
- cifs: clean up an inconsistent indenting (bsc#1193629).
- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).
- cifs: do not skip link targets when an I/O fails (bsc#1194625).
- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).
- cifs: fix bad fids sent over wire (bsc#1197157).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).
- cifs: fix handlecache and multiuser (bsc#1193629).
- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).
- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).
- cifs: fix minor compile warning (bsc#1193629).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).
- cifs: fix potential deadlock in direct reclaim (bsc#1193629).
- cifs: fix potential double free during failed mount (bsc#1193629).
- cifs: fix potential race with cifsd thread (bsc#1193629).
- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).
- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).
- cifs: fix the connection state transitions with multichannel (bsc#1193629).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).
- cifs: fix workstation_name for multiuser mounts (bsc#1193629).
- cifs: force new session setup and tcon for dfs (bsc#1193629).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).
- cifs: make status checks in version independent callers (bsc#1193629).
- cifs: mark sessions for reconnection in helper function (bsc#1193629).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).
- cifs: move superblock magic defitions to magic.h (bsc#1193629).
- cifs: potential buffer overflow in handling symlinks (bsc#1193629).
- cifs: print TIDs as hex (bsc#1193629).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).
- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).
- cifs: release cached dentries only if mount is complete (bsc#1193629).
- cifs: remove check of list iterator against head past the loop body (bsc#1193629).
- cifs: remove redundant assignment to pointer p (bsc#1193629).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).
- cifs: remove repeated state change in dfs tree connect (bsc#1193629).
- cifs: remove unused variable ses_selected (bsc#1193629).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).
- cifs: return the more nuanced writeback error on close() (bsc#1193629).
- cifs: serialize all mount attempts (bsc#1193629).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).
- cifs: skip trailing separators of prefix paths (bsc#1193629).
- cifs: smbd: fix typo in comment (bsc#1193629).
- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).
- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).
- cifs: update internal module number (bsc#1193629).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).
- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).
- cifs: use new enum for ses_status (bsc#1193629).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).
- cifs: writeback fix (bsc#1193629).
- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).
- clk: at91: generated: consider range when calculating best rate (git-fixes).
- clk: at91: sama7g5: fix parents of PDMCs' GCLK (git-fixes).
- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).
- clk: bcm2835: Remove unused variable (git-fixes).
- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).
- clk: Enforce that disjoints limits are invalid (git-fixes).
- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).
- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).
- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).
- clk: imx8mp: fix usb_root_clk parent (git-fixes).
- clk: imx: Add check for kcalloc (git-fixes).
- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).
- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- clk: Initialize orphan req_rate (git-fixes).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).
- clk: nxp: Remove unused variable (git-fixes).
- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).
- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).
- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).
- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).
- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).
- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).
- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).
- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).
- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).
- clk: tegra: Add missing reset deassertion (git-fixes).
- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).
- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).
- clk: uniphier: Fix fixed-rate initialization (git-fixes).
- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).
- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).
- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).
- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).
- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).
- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).
- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).
- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).
- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).
- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).
- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).
- copy_process(): Move fd_install() out of sighand->siglock critical section (bsc#1199626).
- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).
- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).
- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).
- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- crypto: amlogic - call finalize with bh disabled (git-fixes).
- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).
- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).
- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).
- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).
- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).
- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).
- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).
- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).
- crypto: ccree - use fine grained DMA mapping dir (git-fixes).
- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).
- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).
- crypto: engine - check if BH is disabled during completion (git-fixes).
- crypto: gemini - call finalize with bh disabled (git-fixes).
- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).
- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).
- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).
- crypto: marvell/cesa - ECB does not IV (git-fixes).
- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).
- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).
- crypto: qat - disable registration of algorithms (git-fixes).
- crypto: qat - do not cast parameter in bit operations (git-fixes).
- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).
- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).
- crypto: rockchip - ECB does not need IV (git-fixes).
- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).
- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).
- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).
- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).
- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).
- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).
- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).
- crypto: sun8i-ss - handle zero sized sg (git-fixes).
- crypto: sun8i-ss - really disable hash on A80 (git-fixes).
- crypto: sun8i-ss - rework handling of IV (git-fixes).
- crypto: vmx - add missing dependencies (git-fixes).
- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).
- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).
- crypto: xts - Add softdep on ecb (git-fixes).
- dax: fix cache flush on PMD-mapped pages (bsc#1200830).
- devlink: Add 'enable_iwarp' generic device param (bsc#1200502).
- dim: initialize all struct fields (git-fixes).
- display/amd: decrease message verbosity about watermarks table failure (git-fixes).
- dma: at_xdmac: fix a missing check on list iterator (git-fixes).
- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- dma-debug: fix return value of __setup handlers (git-fixes).
- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).
- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).
- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).
- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).
- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).
- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).
- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).
- dmaengine: idxd: fix device cleanup on disable (git-fixes).
- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).
- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).
- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).
- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).
- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).
- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).
- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).
- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).
- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).
- dmaengine: Revert 'dmaengine: shdma: Fix runtime PM imbalance on error' (git-fixes).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).
- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).
- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).
- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).
- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).
- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).
- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).
- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).
- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).
- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).
- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).
- doc/ip-sysctl: add bc_forwarding (git-fixes).
- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).
- Documentation: add link to stable release candidate tree (git-fixes).
- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).
- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).
- Documentation: update stable tree link (git-fixes).
- do not call utsname() after ->nsproxy is NULL (bsc#1201196).
- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).
- drbd: fix duplicate array initializer (git-fixes).
- drbd: Fix five use after free bugs in get_initial_state (git-fixes).
- drbd: remove assign_p_sizes_qlim (git-fixes).
- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).
- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).
- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).
- driver base: fix compaction sysfs file leak (git-fixes).
- driver: base: fix UAF when driver_attach failed (git-fixes).
- driver core: dd: fix return value of __setup handler (git-fixes).
- driver core: fix deadlock in __device_attach (git-fixes).
- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).
- driver core: Free DMA range map when device is released (git-fixes).
- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).
- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).
- driver: hv: Rename 'alloced' to 'allocated' (git-fixes).
- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).
- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).
- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).
- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).
- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).
- driver: net: xgene: Fix regression in CRC stripping (git-fixes).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).
- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).
- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).
- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).
- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).
- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- drm: add a locked version of drm_is_current_master (git-fixes).
- drm: Add orientation quirk for GPD Win Max (git-fixes).
- drm/amd: Add USBC connector ID (git-fixes).
- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).
- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).
- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).
- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).
- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).
- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).
- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).
- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).
- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).
- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).
- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).
- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).
- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).
- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).
- drm/amd/display: Enable power gating before init_pipes (git-fixes).
- drm/amd/display: FEC check in timing validation (git-fixes).
- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).
- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).
- drm/amd/display: fix audio format not updated after edid updated (git-fixes).
- drm/amd/display: Fix memory leak (git-fixes).
- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)
- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).
- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).
- drm/amd/display: fix yellow carp wm clamping (git-fixes).
- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15' Apple Retina panels (git-fixes).
- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).
- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).
- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).
- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).
- drm/amd/display: Revert FEC check in validation (git-fixes).
- drm/amd/display: Update VTEM Infopacket definition (git-fixes).
- drm/amd/display: Update watermark values for DCN301 (git-fixes).
- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).
- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).
- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).
- drm/amdgpu: add beige goby PCI ID (git-fixes).
- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).
- drm/amdgpu: check vm ready by amdgpu_vm->evicting flag (git-fixes).
- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).
- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/amdgpu/display: add support for multiple backlights (git-fixes).
- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).
- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).
- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).
- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).
- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).
- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).
- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).
- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).
- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).
- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).
- drm/amdgpu: Fix recursive locking warning (git-fixes).
- drm/amdgpu: fix suspend/resume hang regression (git-fixes).
- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).
- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).
- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).
- drm/amdgpu: suppress the warning about enum value 'AMD_IP_BLOCK_TYPE_NUM' (git-fixes).
- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).
- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).
- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).
- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).
- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).
- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)
- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).
- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).
- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).
- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).
- drm/amdkfd: Fix GWS queue count (bsc#1190786)
- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).
- drm/amdkfd: make CRAT table missing message informational only (git-fixes).
- drm/amdkfd: remove unused function (git-fixes).
- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).
- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).
- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).
- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).
- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).
- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).
- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).
- drm/amd/pm: Fix missing thermal throttler status (git-fixes).
- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).
- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).
- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).
- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).
- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).
- drm/ast: Create threshold values for AST2600 (bsc#1190786)
- drm/atomic: Do not pollute crtc_state->mode_blob with error pointers (git-fixes).
- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).
- drm: avoid circular locks in drm_mode_getconnector (git-fixes).
- drm/blend: fix typo in the comment (git-fixes).
- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).
- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).
- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).
- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).
- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).
- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).
- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).
- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).
- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).
- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).
- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).
- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).
- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)
- drm: bridge: icn6211: Fix register layout (git-fixes).
- drm: bridge: it66121: Fix the register page length (git-fixes).
- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).
- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)
- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).
- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).
- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).
- drm/connector: Fix typo in output format (bsc#1190786)
- drm/doc: overview before functions for drm_writeback.c (git-fixes).
- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)
- drm/edid: Always set RGB444 (git-fixes).
- drm/edid: check basic audio support on CEA extension block (git-fixes).
- drm/edid: Do not clear formats if using deep color (git-fixes).
- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)
- drm/edid: fix invalid EDID extension block filtering (git-fixes).
- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).
- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).
- drm/fourcc: fix integer type usage in uapi header (git-fixes).
- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).
- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).
- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).
- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).
- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).
- drm/i915/display: Move DRRS code its own file (git-fixes).
- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).
- drm/i915/display: split out dpt out of intel_display.c (git-fixes).
- drm/i915/dmc: Add MMIO range restrictions (git-fixes).
- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).
- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).
- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).
- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).
- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)
- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)
- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).
- drm/i915/gem: add missing boundary check in vm_access (git-fixes).
- drm/i915/gem: add missing else (git-fixes).
- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).
- drm/i915: Keep gem ctx->vm alive until the final put (bsc#1190497)
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).
- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).
- drm/i915/ttm: ensure we unmap when purging (git-fixes).
- drm/i915/ttm: tweak priority hint selection (git-fixes).
- drm/i915: Widen the QGV point mask (git-fixes).
- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).
- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).
- drm: imx: fix compiler warning with gcc-12 (git-fixes).
- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).
- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).
- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).
- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).
- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).
- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).
- drm: mali-dp: potential dereference of null pointer (git-fixes).
- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)
- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).
- drm/mediatek: Fix mtk_cec_mask() (git-fixes).
- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).
- drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes).
- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).
- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).
- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).
- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).
- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).
- drm/msm: add missing include to msm_drv.c (git-fixes).
- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).
- drm/msm/disp: check the return value of kzalloc() (git-fixes).
- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)
- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).
- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).
- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).
- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).
- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).
- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)
- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).
- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).
- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).
- drm/msm/dp: force link training for display resolution change (git-fixes).
- drm/msm/dp: Modify prototype of encoder based API (git-fixes).
- drm/msm/dp: populate connector of struct dp_panel (git-fixes).
- drm/msm/dp: remove fail safe mode related code (git-fixes).
- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).
- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)
- drm/msm/dp: stop link training after link training 2 failed (git-fixes).
- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)
- drm/msm/dpu: add DSPP blocks teardown (git-fixes).
- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).
- drm/msm/dpu: fix dp audio condition (git-fixes).
- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)
- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).
- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).
- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).
- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).
- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).
- drm/msm/dsi: Use 'ref' fw clock instead of global name for VCO parent (git-fixes).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).
- drm/msm: Fix range size vs end confusion (git-fixes).
- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).
- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/msm/mdp5: check the return of kzalloc() (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).
- drm/msm: properly add and remove internal bridges (bsc#1190768)
- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)
- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).
- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).
- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).
- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).
- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).
- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).
- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).
- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).
- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).
- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).
- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).
- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).
- drm/panfrost: Check for error num after setting mask (git-fixes).
- drm/plane: Move range check for format_count earlier (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).
- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).
- drm/simpledrm: Add 'panel orientation' property on non-upright mounted LCD panels (git-fixes).
- drm: sti: do not use kernel-doc markers (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)
- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).
- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).
- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).
- drm: use the lookup lock in drm_is_current_master (git-fixes).
- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).
- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).
- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).
- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).
- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).
- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).
- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).
- drm/vc4: hvs: Fix frame count register readout (git-fixes).
- drm/vc4: hvs: Reset muxes at probe time (git-fixes).
- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).
- drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes).
- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).
- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).
- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).
- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).
- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).
- drm/vmwgfx: Remove unused compile options (bsc#1190786)
- drm/vmwgfx: validate the screen formats (git-fixes).
- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).
- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).
- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).
- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).
- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).
- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).
- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).
- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).
- dt-bindings: net: xgmac_mdio: Remove unsupported 'bus-frequency' (git-fixes).
- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).
- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).
- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).
- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).
- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).
- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).
- dt-bindings: usb: hcd: correct usb-device path (git-fixes).
- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).
- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).
- e1000e: Correct NVM checksum verification flow (bsc#1191663).
- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).
- e1000e: Fix possible overflow in LTR decoding (git-fixes).
- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).
- e1000e: Separate ADP board type from TGP (git-fixes).
- EDAC/altera: Fix deferred probing (bsc#1190497).
- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).
- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).
- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).
- EDAC/xgene: Fix deferred probing (bsc#1190497).
- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).
- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).
- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).
- efi: fix return value of __setup handlers (git-fixes).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- epic100: fix use after free on rmmod (git-fixes).
- ethernet/sfc: remove redundant rc variable (bsc#1196306).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext2: correct max file size computing (bsc#1197820).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix ext4_fc_stats trace point (git-fixes).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- ext4: reject the 'commit' option on ext2 filesystems (bsc#1200808).
- extcon: Modify extcon device to be created after driver data is set (git-fixes).
- extcon: ptn5150: Add queue work sync before driver release (git-fixes).
- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).
- fbcon: Avoid 'cap' set but not used warning (bsc#1190786)
- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).
- firewire: core: extend card->lock in fw_core_handle_bus_reset (git-fixes).
- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).
- firewire: remove check of list iterator against head past the loop body (git-fixes).
- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).
- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).
- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).
- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).
- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).
- firmware: google: Properly state IOMEM dependency (git-fixes).
- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).
- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).
- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).
- firmware: sysfb: fix platform-device leak in error path (git-fixes).
- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).
- firmware: use kernel credentials when reading firmware (git-fixes).
- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).
- fs: fix fd table size alignment properly (bsc#1200882).
- fs: handle circular mappings correctly (bsc#1197918).
- fsl_lpuart: Do not enable interrupts too early (git-fixes).
- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).
- fsnotify: fix wrong lockdep annotations (bsc#1200815).
- ftrace: Clean up hash direct_functions on register failures (git-fixes).
- fuse: fix fileattr op failure (bsc#1197292).
- gen_init_cpio: fix short read file handling (bsc#1193289).
- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)
- genirq: Synchronize interrupt thread startup (git-fixes)
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gma500: fix an incorrect NULL check on list iterator (git-fixes).
- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).
- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).
- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).
- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gpiolib: acpi: use correct format characters (git-fixes).
- gpiolib: Never return internal error codes to user space (git-fixes).
- gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes).
- gpio: mvebu: drop pwm base assignment (git-fixes).
- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).
- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).
- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).
- gpio: Return EPROBE_DEFER if gc->to_irq is NULL (git-fixes).
- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).
- gpio: sifive: use the correct register to read output values (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gpu: host1x: Fix a memory leak in 'host1x_remove()' (git-fixes).
- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).
- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: fix the wrong AdminQ buffer queue index check (git-fixes).
- habanalabs: Add check for pci_enable_device (git-fixes).
- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- hex2bin: fix access beyond string end (git-fixes).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- HID: Add support for open wheel and no attachment to T300 (git-fixes).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).
- HID: amd_sfh: Correct the structure field name (git-fixes).
- HID: amd_sfh: Modify the bus name (git-fixes).
- HID: amd_sfh: Modify the hid name (git-fixes).
- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).
- hide appended member supports_dynamic_smps_6ghz (git-fixes).
- HID: elan: Fix potential double free in elan_input_configured (git-fixes).
- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).
- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).
- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).
- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).
- HID: logitech-dj: add new lightspeed receiver id (git-fixes).
- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).
- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).
- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).
- HID: vivaldi: fix sysfs attributes leak (git-fixes).
- hinic: fix bug of wq out of bound access (git-fixes).
- hv_balloon: rate-limit 'Unhandled message' warning (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).
- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).
- hwmon: (f71882fg) Fix negative temperature (git-fixes).
- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).
- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).
- hwmon: (pmbus) Add Vin unit off handling (git-fixes).
- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).
- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).
- hwmon: (pmbus) disable PEC if not enabled (git-fixes).
- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).
- hwmon: (tmp401) Add OF device ID table (git-fixes).
- hwrng: atmel - disable trng on failure path (git-fixes).
- hwrng: cavium - Check health status while reading random data (git-fixes).
- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).
- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).
- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).
- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).
- i2c: at91: use dma safe buffers (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- i2c: bcm2835: Fix the error handling in 'bcm2835_i2c_probe()' (git-fixes).
- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i2c: cadence: Increase timeout per message if necessary (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).
- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).
- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).
- i2c: meson: Fix wrong speed use from probe (git-fixes).
- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).
- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).
- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).
- i2c: npcm: Correct register access width (git-fixes).
- i2c: npcm: Fix timeout calculation (git-fixes).
- i2c: npcm: Handle spurious interrupts (git-fixes).
- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).
- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).
- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).
- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).
- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).
- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).
- i2c: piix4: Move SMBus port selection into function (git-fixes).
- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).
- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).
- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).
- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).
- i2c: xiic: Make bus names unique (git-fixes).
- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).
- i40e: Fix reset path while removing the driver (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- i40e: i40e_main: fix a missing check on list iterator (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).
- i40e: respect metadata on XSK Rx to skb (git-fixes).
- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).
- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).
- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).
- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).
- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).
- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).
- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).
- iavf: Fix init state closure on remove (jsc#SLE-18385).
- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).
- iavf: Fix missing check for running netdev (git-fixes).
- iavf: Fix race in init state (jsc#SLE-18385).
- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).
- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).
- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).
- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).
- IB/hfi1: Allow larger MTU without AIP (git-fixes).
- IB/hfi1: Fix AIP early init panic (git-fixes).
- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).
- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).
- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).
- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- IB/qib: Fix duplicate sysfs directory name (git-fixes).
- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).
- ice: check the return of ice_ptp_gettimex64 (git-fixes).
- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).
- ice: Clear default forwarding VSI during VSI release (git-fixes).
- ice: clear stale Tx queue settings before configuring (git-fixes).
- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).
- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- ice: Do not use GFP_KERNEL in atomic context (git-fixes).
- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).
- ice: fix concurrent reset and removal of VFs (git-fixes).
- ice: fix crash in switchdev mode (jsc#SLE-18375).
- ice: Fix curr_link_speed advertised speed (git-fixes).
- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).
- ice: fix PTP stale Tx timestamps cleanup (git-fixes).
- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).
- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).
- ice: initialize local variable 'tlv' (git-fixes).
- ice: kabi protect ice_pf (bsc#1200502).
- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).
- ice: respect metadata on XSK Rx to skb (git-fixes).
- ice: synchronize_rcu() when terminating rings (git-fixes).
- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).
- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).
- igb: refactor XDP registration (git-fixes).
- igc: avoid kernel warning when changing RX ring parameters (git-fixes).
- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- igc: Fix BUG: scheduling while atomic (git-fixes).
- igc: Fix infinite loop in release_swfw_sync (git-fixes).
- igc: Fix suspending when PTM is active (jsc#SLE-18377).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).
- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).
- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).
- iio: adc: ad7124: Remove shift from scan_type (git-fixes).
- iio: adc: Add check for devm_request_threaded_irq (git-fixes).
- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).
- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).
- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).
- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).
- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).
- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).
- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).
- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio: afe: rescale: Fix boolean logic bug (git-fixes).
- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).
- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).
- iio: dac: ad5592r: Fix the missing return value (git-fixes).
- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).
- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).
- iio:imu:bmi160: disable regulator in error path (git-fixes).
- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).
- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).
- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).
- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).
- iio: inkern: make a best effort on offset calculation (git-fixes).
- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).
- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).
- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).
- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).
- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).
- iio: st_sensors: Add a local lock for protecting odr (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: fix reference leak in asymmetric_verify() (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- init: call time_init() before rand_initialize() (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- init/main.c: return 1 from handled __setup() functions (git-fixes).
- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- Input: add bounds checking to input_set_capability() (git-fixes).
- Input: aiptek - properly check endpoint type (git-fixes).
- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).
- Input: ili210x - fix reset timing (git-fixes).
- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).
- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).
- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).
- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).
- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).
- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).
- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).
- Input: synaptics: retry query upon error (bsc#1194086).
- Input: wm97xx: Simplify resource management (git-fixes).
- Input: zinitix - do not report shadow fingers (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).
- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).
- iomap: iomap_write_failed fix (bsc#1200829).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).
- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).
- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).
- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).
- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- ionic: add FW_STOPPING state (git-fixes).
- ionic: Allow flexibility for error reporting on dev commands (git-fixes).
- ionic: better handling of RESET event (git-fixes).
- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).
- ionic: Cleanups in the Tx hotpath code (git-fixes).
- ionic: Correctly print AQ errors if completions are not received (git-fixes).
- ionic: disable napi when ionic_lif_init() fails (git-fixes).
- ionic: Do not send reset commands if FW isn't running (git-fixes).
- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).
- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).
- ionic: fix up printing of timeout error (git-fixes).
- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).
- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).
- ionic: remove the dbid_inuse bitmap (git-fixes).
- ionic: replace set_vf data with union (git-fixes).
- ionic: start watchdog after all is setup (git-fixes).
- ionic: stretch heartbeat detection (git-fixes).
- io_uring: add more locking annotations for submit (bsc#1199011).
- io_uring: avoid touching inode in rw prep (bsc#1199011).
- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).
- io_uring: cache __io_free_req()'d requests (bsc#1199011).
- io_uring: clean io-wq callbacks (bsc#1199011).
- io_uring: clean up tctx_task_work() (bsc#1199011).
- io_uring: deduplicate open iopoll check (bsc#1199011).
- io_uring: do not halt iopoll too early (bsc#1199011).
- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).
- io_uring: extract a helper for ctx quiesce (bsc#1199011).
- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).
- io_uring: improve ctx hang handling (bsc#1199011).
- io_uring: inline fixed part of io_file_get() (bsc#1199011).
- io_uring: inline io_free_req_deferred (bsc#1199011).
- io_uring: inline io_poll_remove_waitqs (bsc#1199011).
- io_uring: inline struct io_comp_state (bsc#1199011).
- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).
- io_uring: move io_fallback_req_func() (bsc#1199011).
- io_uring: move io_put_task() definition (bsc#1199011).
- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).
- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).
- io_uring: optimise putting task struct (bsc#1199011).
- io_uring: refactor io_alloc_req (bsc#1199011).
- io_uring: remove extra argument for overflow flush (bsc#1199011).
- io_uring: remove file batch-get optimisation (bsc#1199011).
- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).
- io_uring: remove redundant args from cache_free (bsc#1199011).
- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).
- io_uring: rename io_file_supports_async() (bsc#1199011).
- io_uring: run linked timeouts from task_work (bsc#1199011).
- io_uring: run regular file completions from task_work (bsc#1199011).
- io_uring: run timeouts from task_work (bsc#1199011).
- io_uring: use inflight_entry instead of compl.list (bsc#1199011).
- io_uring: use kvmalloc for fixed files (bsc#1199011).
- io-wq: get rid of FIXED worker flag (bsc#1199011).
- io-wq: make worker creation resilient against signals (bsc#1199011).
- io-wq: move nr_running and worker_refs out of wqe->lock protection (bsc#1199011).
- io-wq: only exit on fatal signals (bsc#1199011).
- io-wq: provide a way to limit max number of workers (bsc#1199011).
- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).
- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).
- ipc/sem: do not sleep with a spin lock held (bsc#1198412).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: bail out if init_srcu_struct fails (git-fixes).
- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).
- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).
- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).
- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).
- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).
- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).
- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).
- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).
- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).
- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).
- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).
- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).
- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).
- irqchip/nvic: Release nvic_base upon failure (git-fixes).
- irqchip/qcom-pdc: Fix broken locking (git-fixes).
- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).
- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).
- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).
- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).
- iwlwifi: do not advertise TWT support (git-fixes).
- iwlwifi: Fix -EIO error code that is never returned (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).
- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).
- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).
- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).
- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).
- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).
- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).
- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).
- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).
- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).
- iwlwifi: mvm: move only to an enabled channel (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).
- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).
- ixgbe: respect metadata on XSK Rx to skb (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI: fix change of iscsi_host_remove() arguments (bsc#1198410).
- kABI: Fix kABI after 'x86/mm/cpa: Generalize __set_memory_enc_pgtable()' (jsc#SLE-19924).
- kABI fix of sysctl_run_estimation (git-fixes).
- kABI: fix removal of iscsi_destroy_conn (bsc#1198410).
- kABI: fix rndis_parameters locking (git-fixes).
- kABI: ivtv: restore caps member (git-fixes).
- kabi/severities: add exception for bcache symboles
- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)
- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.
- kABI workaround for fxls8962af iio accel drivers (git-fixes).
- kABI workaround for pci quirks (git-fixes).
- kconfig: fix failing to generate auto.conf (git-fixes).
- kconfig: let 'shell' return enough output for deep path names (git-fixes).
- kernel/fork: Initialize mm's PASID (jsc#SLE-24350).
- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).
- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).
- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).
- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).
- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).
- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).
- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).
- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).
- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).
- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).
- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).
- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).
- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).
- kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe() (bsc#1193277).
- kselftest/arm64: bti: force static linking (git-fixes).
- kunit: tool: Import missing importlib.abc (git-fixes).
- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).
- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).
- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).
- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).
- KVM: Clean up benign vcpu->cpu data races when kicking vCPUs (git-fixes).
- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).
- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).
- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).
- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).
- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).
- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'em (git-fixes).
- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).
- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).
- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).
- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).
- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).
- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).
- KVM: s390: pv: add macros for UVC CC values (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).
- KVM: selftests: Do not skip L2's VMCALL in SMM test for SVM guest (bsc#1194523).
- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).
- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).
- KVM: SEV: do not take kvm->lock when destroying (bsc#1194526).
- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).
- KVM: SEV: Mark nested locking of kvm->lock (bsc#1194526).
- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).
- KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255 (bsc#1193823).
- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).
- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).
- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).
- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).
- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).
- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).
- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).
- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).
- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).
- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).
- KVM: VMX: Read Posted Interrupt 'control' exactly once per loop iteration (git-fixes).
- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).
- KVM: VMX: Remove defunct 'nr_active_uret_msrs' field (git-fixes).
- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).
- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).
- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).
- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).
- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).
- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).
- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).
- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).
- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).
- KVM: x86: Drop WARNs that assert a triple fault never 'escapes' from L2 (git-fixes).
- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).
- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).
- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).
- KVM: x86: Fix emulation in writing cr8 (git-fixes).
- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).
- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).
- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).
- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).
- KVM: x86: Ignore sparse banks size for an 'all CPUs', non-sparse IPI req (git-fixes).
- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).
- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).
- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).
- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).
- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).
- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).
- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).
- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).
- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).
- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).
- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).
- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).
- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).
- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).
- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).
- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).
- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).
- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).
- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).
- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).
- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).
- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).
- KVM: x86: SVM: move avic definitions from AMD's spec to svm.h (bsc#1193823 jsc#SLE-24549).
- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).
- KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSS (git-fixes).
- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).
- lib: bitmap: fix many kernel-doc warnings (git-fixes).
- libbpf: Free up resources used by inner map definition (git-fixes).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (git-fixes).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).
- list: test: Add a test for list_is_head() (git-fixes).
- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).
- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).
- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).
- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).
- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).
- locking/rwlocks: introduce write_lock_nested (bsc#1189998).
- LSM: general protection fault in legacy_parse_param (git-fixes).
- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).
- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).
- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).
- mac80211: fix potential double free on mesh join (git-fixes).
- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).
- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).
- mac80211: mlme: check for null after calling kmemdup (git-fixes).
- mac80211: refuse aggregations sessions before authorized (git-fixes).
- mac80211: Remove a couple of obsolete TODO (git-fixes).
- mac80211: Reset MBSSID parameters upon connection (git-fixes).
- mac80211: treat some SAE auth steps as final (git-fixes).
- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).
- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).
- mailbox: change mailbox-mpfs compatible string (git-fixes).
- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).
- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).
- mailbox: tegra-hsp: Flush whole channel (git-fixes).
- maple: fix wrong return value of maple_bus_init() (git-fixes).
- md: Do not set mddev private to NULL in raid0 pers->free (git-fixes).
- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).
- md: fix an incorrect NULL check in md_reload_sb (git-fixes).
- md: fix double free of io_acct_set bioset (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- md: Move alloc/free acct bioset in to personality (git-fixes).
- md/raid5: play nice with PREEMPT_RT (bsc#1189998).
- media: aspeed: Correct value for h-total-pixels (git-fixes).
- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).
- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).
- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).
- media: atomisp: fix bad usage at error handling logic (git-fixes).
- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).
- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).
- media: bttv: fix WARNING regression on tunerless devices (git-fixes).
- media: camss: csid-170: do not enable unused irqs (git-fixes).
- media: camss: csid-170: fix non-10bit formats (git-fixes).
- media: camss: csid-170: remove stray comment (git-fixes).
- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).
- media: camss: vfe-170: fix 'VFE halt timeout' error (git-fixes).
- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).
- media: cec-adap.c: fix is_configuring state (git-fixes).
- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).
- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).
- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).
- media: cx25821: Fix the warning when removing the module (git-fixes).
- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).
- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).
- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).
- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).
- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).
- media: em28xx: initialize refcount before kref_get (git-fixes).
- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).
- media: hantro: Empty encoder capture buffers by default (git-fixes).
- media: hantro: Fix overfill bottom register field name (git-fixes).
- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).
- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).
- media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes).
- media: i2c: max9286: fix kernel oops when removing module (git-fixes).
- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).
- media: i2c: max9286: Use 'maxim,gpio-poc' property (git-fixes).
- media: i2c: ov5648: Fix lockdep error (git-fixes).
- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).
- media: imon: reorganize serialization (git-fixes).
- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).
- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).
- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).
- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).
- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).
- media: ir_toy: free before error exiting (git-fixes).
- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).
- media: mexon-ge2d: fixup frames size in registers (git-fixes).
- media: mtk-vcodec: potential dereference of null pointer (git-fixes).
- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).
- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).
- media: ov5648: Do not pack controls struct (git-fixes).
- media: ov6650: Add try support to selection API operations (git-fixes).
- media: ov6650: Fix crop rectangle affected by set format (git-fixes).
- media: ov6650: Fix set format try processing path (git-fixes).
- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).
- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).
- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).
- media: rga: fix possible memory leak in rga_probe (git-fixes).
- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).
- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).
- media: rkvdec: Stop overclocking the decoder (git-fixes).
- media: rockchip/rga: do proper error checking in probe (git-fixes).
- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).
- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).
- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).
- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).
- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).
- media: staging: media: zoran: move videodev alloc (git-fixes).
- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).
- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).
- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).
- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).
- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).
- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).
- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).
- media: venus: hfi: avoid null dereference in deinit (git-fixes).
- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).
- media: videobuf2: Fix the size printk format (git-fixes).
- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).
- media: vidtv: Check for null return of vzalloc (git-fixes).
- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).
- mei: hbm: drop capability response on early shutdown (git-fixes).
- mei: me: add Alder Lake N device id (git-fixes).
- mei: me: add raptor lake point S DID (git-fixes).
- mei: me: disable driver on the ign firmware (git-fixes).
- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).
- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).
- memory: emif: Add check for setup_interrupts (git-fixes).
- memory: emif: check the pointer temp in get_device_details() (git-fixes).
- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).
- memory: mtk-smi: Add error handle for smi_probe (git-fixes).
- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).
- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).
- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).
- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).
- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).
- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).
- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).
- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).
- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).
- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).
- misc: alcor_pci: Fix an error handling path (git-fixes).
- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).
- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).
- misc: rtsx: set NULL intfdata when probe fails (git-fixes).
- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).
- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).
- mlx5: kabi protect lag_mp (git-fixes).
- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).
- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)
- mmc: block: Check for errors after write on SPI (git-fixes).
- mmc: block: Fix CQE recovery reset success (git-fixes).
- mmc: block: fix read single on recovery logic (git-fixes).
- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).
- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).
- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).
- mmc: core: Wait for command setting 'Power Off Notification' bit to complete (git-fixes).
- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).
- mm: Change CONFIG option for mm->pasid field (jsc#SLE-24350).
- mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes).
- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).
- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).
- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).
- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).
- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).
- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).
- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).
- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).
- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).
- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).
- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).
- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).
- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).
- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).
- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).
- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).
- mm, page_alloc: fix build_zonerefs_node() (git-fixes).
- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).
- mm/slub: add missing TID updates on slab deactivation (git-fixes).
- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).
- mm, thp: lock filemap when truncating page cache (bsc#1198023).
- mm/vmalloc: fix comments about vmap_area struct (git-fixes).
- mm_zone: add function to check if managed dma zone exists (bsc#1197501).
- modpost: fix removing numeric suffixes (git-fixes).
- modpost: fix section mismatch check for exported init/exit sections (git-fixes).
- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).
- modpost: restore the warning message for missing symbol versions (git-fixes).
- mptcp: add missing documented NL params (git-fixes).
- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).
- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).
- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).
- mt76: fix encap offload ethernet type check (git-fixes).
- mt76: fix monitor mode crash with sdio driver (git-fixes).
- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).
- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).
- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).
- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).
- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).
- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).
- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).
- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).
- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).
- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).
- mt76: mt7921: fix crash when startup fails (git-fixes).
- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).
- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).
- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).
- mtd: mchp23k256: Add SPI ID table (git-fixes).
- mtd: mchp48l640: Add SPI ID table (git-fixes).
- mtd: onenand: Check for error irq (git-fixes).
- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).
- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).
- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).
- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).
- mtd: rawnand: denali: Use managed device resources (git-fixes).
- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).
- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).
- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).
- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).
- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).
- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).
- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).
- n64cart: convert bi_disk to bi_bdev->bd_disk fix build (git-fixes).
- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).
- net: asix: add proper error handling of usb read errors (git-fixes).
- net: atlantic: Avoid out-of-bounds indexing (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: axienet: setup mdio unconditionally (git-fixes).
- net: bnxt_ptp: fix compilation error (bsc#1199736).
- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).
- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).
- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).
- net: dpaa_eth: remove dead select in menuconfig FSL_DPAA_ETH (git-fixes).
- net: dsa: be compatible with masters which unregister on shutdown (git-fixes).
- net: dsa: hellcreek: be compatible with masters which unregister on shutdown (git-fixes).
- net: dsa: microchip: ksz8863: be compatible with masters which unregister on shutdown (git-fixes).
- net: dsa: xrs700x: be compatible with masters which unregister on shutdown (git-fixes).
- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).
- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).
- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).
- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).
- netfilter: conntrack: move synack init code to helper (bsc#1199035).
- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).
- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).
- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).
- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).
- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).
- net: hns3: add return value for mailbox handling in PF (bsc#1190336).
- net: hns3: add validity check for message data length (git-fixes).
- net: hns3: add vlan list lock to protect vlan list (git-fixes).
- net: hns3: align the debugfs output to the left (git-fixes).
- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).
- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).
- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).
- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).
- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).
- net: hns3: handle empty unknown interrupt for VF (git-fixes).
- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).
- net: hns3: refine the process when PF set VF VLAN (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).
- net/ice: Fix boolean assignment (bsc#1200502).
- net/ice: Remove unused enum (bsc#1200502).
- net: ipa: disable HOLB drop when updating timer (git-fixes).
- net: ipa: HOLB register sometimes must be written twice (git-fixes).
- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).
- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).
- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mana: Add counter for packet dropped by XDP (bsc#1195651).
- net: mana: Add counter for XDP_TX (bsc#1195651).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- net: mana: Reuse XDP dropped page (bsc#1195651).
- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).
- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).
- net: marvell: prestera: fix double free issue on err path (git-fixes).
- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).
- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).
- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).
- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).
- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).
- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).
- net/mlx5: DR, Cache STE shadow memory (git-fixes).
- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).
- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).
- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).
- net/mlx5e: Add missing increment of count (jsc#SLE-19253).
- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).
- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).
- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).
- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).
- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).
- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).
- net/mlx5e: Fix module EEPROM query (git-fixes).
- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).
- net/mlx5e: Fix trust state reset in reload (git-fixes).
- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).
- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).
- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).
- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).
- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).
- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).
- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).
- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).
- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).
- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).
- net/mlx5: Fix a race on command flush flow (git-fixes).
- net/mlx5: Fix deadlock in sync reset flow (git-fixes).
- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).
- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).
- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).
- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).
- net: mvmdio: fix compilation warning (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).
- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).
- net: phy: correct spelling error of media in documentation (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).
- net: phy: Fix race condition on link status change (git-fixes).
- net: phy: marvell10g: fix return value on error (git-fixes).
- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).
- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).
- net: phy: meson-gxl: improve link-up behavior (git-fixes).
- net: phy: micrel: Allow probing without .driver_data (git-fixes).
- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).
- net: phy: micrel: Pass .probe for KS8737 (git-fixes).
- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).
- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).
- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: sfc: add missing xdp queue reinitialization (git-fixes).
- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).
- net: sfc: fix memory leak due to ptp channel (git-fixes).
- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).
- net/smc: Avoid warning of possible recursive locking (git-fixes).
- net/smc: fix connection leak (git-fixes).
- net/smc: fixes for converting from 'struct smc_cdc_tx_pend **' to 'struct smc_wr_tx_pend_priv *' (git-fixes).
- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).
- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).
- net/smc: postpone sk_refcnt increment in connect() (git-fixes).
- net/smc: remove redundant re-assignment of pointer link (git-fixes).
- net/smc: Remove unused function declaration (git-fixes).
- net/smc: Reset conn->lgr when link group registration fails (git-fixes).
- net/smc: set ini->smcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).
- net/smc: sync err code when tcp connection was refused (git-fixes).
- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).
- net/smc: Transitional solution for clcsock race issue (git-fixes).
- net/smc: Use a mutex for locking 'struct smc_pnettable' (git-fixes).
- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).
- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).
- net: stmmac: Fix signed/unsigned wreckage (git-fixes).
- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).
- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).
- net: usb: asix: do not force pause frames support (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).
- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).
- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).
- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).
- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).
- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).
- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).
- nfc: NULL out the dev->rfkill to prevent UAF (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- nfc: pn533: Fix buggy cleanup order (git-fixes).
- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).
- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nfp: flower: fix ida_idx not being released (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).
- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).
- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).
- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- NFSD: Fix a write performance regression (bsc#1197016).
- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).
- NFSD: Fix nsfd startup race (again) (git-fixes).
- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).
- NFSD: Fix READDIR buffer overflow (git-fixes).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- NFSD: Fix verifier returned in stable WRITEs (git-fixes).
- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).
- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).
- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).
- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).
- NFS: Do not overfill uncached readdir pages (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report ENOSPC write errors twice (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (git-fixes).
- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).
- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).
- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFS: fix broken handling of the softreval mount option (git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).
- NFS: pass cred explicitly for access tests (git-fixes).
- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).
- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).
- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).
- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).
- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- nl80211: show SSID for P2P_GO interfaces (git-fixes).
- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).
- nl80211: validate S1G channel width (git-fixes).
- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).
- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).
- nvme: add verbose error logging (bsc#1200567). Update config files.
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme: send uevent on connection up (jsc#SLE-23643).
- objtool: Add frame-pointer-specific function ignore (bsc#1193277).
- objtool: Fix code relocs vs weak symbols (git-fixes).
- objtool: Fix type of reloc::addend (git-fixes).
- objtool: Ignore unwind hints for ignored functions (bsc#1193277).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- octeontx2-af: Add a 'rvu_free_bitmap()' function (gix-fixes).
- octeontx2-af: Fix some memory leaks in the error handling path of 'cgx_lmac_init()' (git-fixes).
- of: base: Fix phandle argument length mismatch error message (git-fixes).
- of: base: Improve argument length mismatch error (git-fixes).
- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).
- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).
- of: Support more than one crash kernel regions for kexec -s (git-fixes).
- of: unittest: 64 bit dma address test requires arch support (git-fixes).
- of: unittest: fix warning on PowerPC frame size warning (git-fixes).
- of: unittest: update text of expected warnings (git-fixes).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).
- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).
- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).
- PCI: aardvark: Add support for PME interrupts (git-fixes).
- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).
- PCI: aardvark: Clear all MSIs at setup (git-fixes).
- PCI: aardvark: Comment actions in driver remove method (git-fixes).
- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).
- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).
- PCI: aardvark: Disable link training when unbinding driver (git-fixes).
- PCI: aardvark: Do not mask irq when mapping (git-fixes).
- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).
- PCI: aardvark: Enable MSI-X support (git-fixes).
- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).
- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).
- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).
- PCI: aardvark: Fix setting MSI address (git-fixes).
- PCI: aardvark: Fix support for MSI interrupts (git-fixes).
- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).
- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).
- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).
- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).
- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).
- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).
- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).
- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).
- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).
- PCI: aardvark: Update comment about link going down after link-up (git-fixes).
- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev->of_node) (git-fixes).
- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).
- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).
- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).
- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).
- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).
- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).
- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).
- PCI: endpoint: Fix misused goto label (git-fixes).
- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).
- PCI: imx6: Fix PERST# start-up sequence (git-fixes).
- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).
- PCI: microchip: Fix potential race in interrupt handling (git-fixes).
- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).
- PCI: mvebu: Fix device enumeration regression (git-fixes).
- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).
- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).
- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).
- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).
- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).
- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).
- PCI/PM: Power up all devices during runtime resume (git-fixes).
- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).
- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).
- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).
- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).
- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).
- perf: Copy perf_event_attr::sig_data on modification (git fixes).
- perf/core: Do not pass task around when ctx sched in (git-fixes).
- perf/core: Fix address filter parser for multiple filters (git fixes).
- perf/core: Fix cgroup event list management (git fixes).
- perf/core: Fix perf_cgroup_switch() (git fixes).
- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).
- perf: Fix list corruption in perf_cgroup_switch() (git fixes).
- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).
- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).
- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).
- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).
- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).
- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).
- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).
- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).
- phy: dphy: Correct clk_pre parameter (git-fixes).
- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).
- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).
- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).
- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).
- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).
- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).
- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).
- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).
- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).
- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).
- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).
- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).
- phy: usb: Leave some clocks running during suspend (git-fixes).
- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).
- pinctrl: bcm2835: Fix a few error paths (git-fixes).
- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).
- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- pinctrl: k210: Fix bias-pull-up (git-fixes).
- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).
- pinctrl: mediatek: moore: Fix build error (git-fixes).
- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).
- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).
- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).
- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).
- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).
- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).
- pinctrl: microchip-sgpio: lock RMW access (git-fixes).
- pinctrl: microchip sgpio: use reset driver (git-fixes).
- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).
- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).
- pinctrl: npcm: Fix broken references to chip->parent_device (git-fixes).
- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).
- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).
- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).
- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).
- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).
- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).
- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).
- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).
- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).
- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).
- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).
- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).
- pinctrl: samsung: drop pin banks references on error paths (git-fixes).
- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).
- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).
- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).
- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).
- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).
- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).
- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).
- pinctrl: tigerlake: Revert 'Add Alder Lake-M ACPI ID' (git-fixes).
- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).
- ping: remove pr_err from ping_lookup (bsc#1195826).
- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).
- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).
- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).
- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).
- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).
- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).
- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).
- platform/surface: surface3-wmi: Simplify resource management (git-fixes).
- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).
- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).
- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).
- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).
- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).
- platform/x86: asus-wmi: Fix 'unsigned 'retval' is never less than zero' smatch warning (bsc#1198058).
- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).
- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).
- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).
- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).
- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).
- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).
- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).
- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).
- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).
- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).
- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).
- platform/x86: panasonic-laptop: revert 'Resolve hotkey double trigger bug' (git-fixes).
- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).
- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).
- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).
- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).
- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).
- PM: domains: Fix initialization of genpd's next_wakeup (git-fixes).
- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).
- PM: hibernate: fix __setup handler error handling (git-fixes).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- PM: suspend: fix return value of __setup handler (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).
- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).
- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).
- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).
- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).
- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).
- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).
- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).
- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).
- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).
- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).
- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).
- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).
- powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes).
- powerpc/xive: Change the debugfs file 'xive' into a directory (bsc#1194409 ltc#195810).
- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).
- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).
- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).
- powerpc/xive: Rename the 'cpus' debugfs file to 'ipis' (bsc#1194409 ltc#195810).
- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).
- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).
- power: supply: axp20x_battery: properly report current when discharging (git-fixes).
- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).
- power: supply: axp288_fuel_gauge: Drop BIOS version check from 'T3 MRD' DMI quirk (git-fixes).
- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).
- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).
- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).
- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).
- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).
- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- proc: bootconfig: Add null pointer check (git-fixes).
- proc: fix documentation and description of pagemap (git-fixes).
- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).
- psi: fix 'defined but not used' warnings when (git-fixes)
- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).
- pvpanic: Fix typos in the comments (git-fixes).
- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).
- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).
- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).
- qed: display VF trust config (git-fixes).
- qede: confirm skb is allocated before using (git-fixes).
- qed: fix ethtool register dump (jsc#SLE-19001).
- qed: return status of qed_iov_get_link (git-fixes).
- qla2xxx: add ->map_queues support for nvme (bsc#1195823).
- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).
- raid5: introduce MD_BROKEN (git-fixes).
- random: check for signal_pending() outside of need_resched() check (git-fixes).
- random: wake up /dev/random writers after zap (git-fixes).
- random: wire up fops->splice_{read,write}_iter() (git-fixes).
- ray_cs: Check ioremap return value (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (git-fixes).
- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).
- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).
- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/irdma: Fix netdev notifications for vlan's (git-fixes).
- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).
- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).
- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).
- RDMA/irdma: Prevent some integer underflows (git-fixes).
- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).
- RDMA/irdma: Remove incorrect masking of PD (git-fixes).
- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/mlx5: Add a missing update of cache->last_add (git-fixes).
- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).
- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).
- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).
- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).
- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).
- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).
- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).
- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).
- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).
- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).
- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).
- regmap-irq: Update interrupt clear register for proper reset (git-fixes).
- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).
- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).
- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).
- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).
- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).
- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).
- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).
- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).
- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).
- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).
- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).
- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).
- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).
- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).
- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).
- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).
- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).
- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).
- Revert 'drm/amd/display: Fix DCN3 B0 DP Alt Mapping' (git-fixes).
- Revert 'drm/amdgpu/display: set vblank_disable_immediate for DC' (git-fixes).
- Revert 'svm: Add warning message for AVIC IPI invalid target' (git-fixes).
- rfkill: make new event layout opt-in (git-fixes).
- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).
- riscv: Fix fill_callchain return value (git fixes).
- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).
- rpmsg: qcom_smd: Fix redundant channel->registered assignment (git-fixes).
- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).
- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).
- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).
- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).
- rtc: check if __rtc_read_time was successful (git-fixes).
- rtc: fix use-after-free on device removal (git-fixes).
- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).
- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).
- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).
- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).
- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).
- rtc: mxc: Silence a clang warning (git-fixes).
- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).
- rtc: pl031: fix rtc features null pointer dereference (git-fixes).
- rtc: sun6i: Fix time overflow handling (git-fixes).
- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).
- rtl818x: Prevent using not initialized queues (git-fixes).
- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).
- rtw88: 8821c: fix debugfs rssi value (git-fixes).
- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).
- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).
- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).
- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).
- s390/ctcm: fix potential memory leak (git-fixes).
- s390/ctcm: fix variable dereferenced before check (git-fixes).
- s390/dasd: fix data corruption for ESE devices (git-fixes).
- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).
- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).
- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).
- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).
- s390/extable: fix exception table sorting (git-fixes).
- s390/kexec_file: fix error handling when applying relocations (git-fixes).
- s390/kexec: fix memory leak of ipl report buffer (git-fixes).
- s390/kexec: fix return code handling (git-fixes).
- s390/lcs: fix variable dereferenced before check (git-fixes).
- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).
- s390/module: fix loading modules with a lot of relocations (git-fixes).
- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).
- s390/nmi: handle vector validity failures for KVM guests (git-fixes).
- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).
- s390/setup: avoid reserving memory above identity mapping (git-fixes).
- s390/smp: sort out physical vs virtual pointers usage (git-fixes).
- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).
- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).
- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).
- sched/core: Export pelt_thermal_tp (git-fixes)
- sched/core: Fix forceidle balancing (git-fixes)
- sched/core: Mitigate race (git-fixes)
- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)
- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).
- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).
- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).
- sched/fair: Revise comment about lb decision matrix (git-fixes)
- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)
- sched: Fix yet more sched_fork() races (git fixes (sched/core)).
- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)
- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).
- sched/numa: Apply imbalance limitations consistently (bnc#1193431).
- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).
- sched/numa: Initialise numa_migrate_retry (bnc#1193431).
- sched/pasid: Add a kABI workaround (jsc#SLE-24350).
- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)
- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)
- sched/psi: report zeroes for CPU full at the system level (git-fixes)
- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)
- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)
- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)
- sched/sugov: Ignore 'busy' filter when rq is capped by (git-fixes)
- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)
- scripts/faddr2line: Fix overlapping text section failures (git-fixes).
- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).
- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).
- scsi: core: Query VPD size before getting full page (git-fixes).
- scsi: dc395x: Fix a missing check on list iterator (git-fixes).
- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).
- scsi: fnic: Fix a tracing statement (git-fixes).
- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).
- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).
- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).
- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).
- scsi: hisi_sas: Fix some issues related to asd_sas_port->phy_list (bsc#1198802).
- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).
- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).
- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).
- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).
- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: iscsi: Add helper functions to manage iscsi_cls_conn (bsc#1198410).
- scsi: iscsi: Add helper to remove a session from the kernel (bsc#1198410).
- scsi: iscsi: Allow iscsi_if_stop_conn() to be called from kernel (bsc#1198410).
- scsi: iscsi: Clean up bound endpoints during shutdown (bsc#1198410).
- scsi: iscsi: Fix HW conn removal use after free (bsc#1198410).
- scsi: iscsi: Fix session removal on shutdown (bsc#1198410).
- scsi: libiscsi: Teardown iscsi_cls_conn gracefully (bsc#1198410).
- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).
- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port->phy_list (bsc#1198802).
- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).
- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).
- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).
- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).
- scsi: libsas: Keep host active while processing events (bsc#1198802).
- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).
- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).
- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).
- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).
- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).
- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).
- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).
- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).
- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).
- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).
- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).
- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).
- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).
- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).
- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).
- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).
- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).
- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).
- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).
- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).
- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).
- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).
- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).
- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).
- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).
- scsi: lpfc: Remove unneeded variable (bsc#1200045).
- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).
- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).
- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).
- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).
- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).
- scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045).
- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).
- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).
- scsi: mpt3sas: Page fault in reply q processing (git-fixes).
- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).
- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port->phy_list (bsc#1198802).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: pm8001: Fix abort all task initialization (git-fixes).
- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).
- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).
- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).
- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).
- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).
- scsi: qedi: Use QEDI_MODE_NORMAL for error handling (bsc#1198410).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).
- scsi: sr: Do not leak information in ioctl (git-fixes).
- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).
- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).
- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).
- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).
- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).
- selftest: KVM: Add open sev dev helper (bsc#1194526).
- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).
- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).
- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).
- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).
- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).
- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).
- selftests: kvm: Remove absent target file (git-fixes).
- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).
- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).
- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).
- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).
- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).
- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).
- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).
- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).
- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).
- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).
- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).
- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).
- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).
- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).
- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).
- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).
- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).
- serial: imx: fix overrun interrupts in DMA mode (git-fixes).
- serial: meson: acquire port->lock in startup() (git-fixes).
- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).
- serial: pch: do not overwrite xmit->buf[0] by x_char (git-fixes).
- serial: rda-uart: Do not allow CS5-6 (git-fixes).
- serial: samsung_tty: do not unlock port->lock for uart_write_wakeup() (git-fixes).
- serial: sh-sci: Do not allow CS5-6 (git-fixes).
- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).
- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).
- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).
- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).
- serial: txx9: Do not allow CS5-6 (git-fixes).
- sfc: Do not free an empty page_ring (git-fixes).
- sfc: fallback for lack of xdp tx queues (bsc#1196306).
- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).
- sfc: Use swap() instead of open coding it (bsc#1196306).
- sfc: use swap() to make code cleaner (bsc#1196306).
- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).
- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).
- slip: fix macro redefine warning (git-fixes).
- smb3: add mount parm nosparse (bsc#1193629).
- smb3: add trace point for lease not found issue (bsc#1193629).
- smb3: add trace point for oplock not found (bsc#1193629).
- smb3: check for null tcon (bsc#1193629).
- smb3: cleanup and clarify status of tree connections (bsc#1193629).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).
- smb3: fix snapshot mount option (bsc#1193629).
- smb3 improve error message when mount options conflict with posix (bsc#1193629).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).
- smb3 move more common protocol header definitions to smbfs_common (bsc#1193629).
- smb3: send NTLMSSP version information (bsc#1193629).
- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).
- smsc911x: allow using IRQ0 (git-fixes).
- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).
- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).
- soc: qcom: aoss: Expose send for generic usecase (git-fixes).
- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).
- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).
- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).
- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).
- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).
- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).
- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).
- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).
- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).
- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).
- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).
- sound/oss/dmasound: fix 'dmasound_setup' defined but not used (git-fixes).
- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).
- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).
- soundwire: qcom: adjust autoenumeration timeout (git-fixes).
- speakup-dectlk: Restore pitch setting (git-fixes).
- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).
- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).
- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).
- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).
- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).
- spi: Fix erroneous sgs value with min_t() (git-fixes).
- spi: Fix invalid sgs value (git-fixes).
- spi: Fix Tegra QSPI example (git-fixes).
- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).
- spi: mxic: Fix the transmit path (git-fixes).
- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).
- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).
- spi: rockchip: Fix error in getting num-cs property (git-fixes).
- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).
- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).
- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).
- spi: rockchip: terminate dma transmission when slave abort (git-fixes).
- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).
- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).
- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).
- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).
- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).
- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).
- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).
- spi: tegra20: Use of_device_get_match_data() (git-fixes).
- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).
- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).
- staging: most: dim2: use device release method (git-fixes).
- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).
- staging: mt7621-dts: fix formatting (git-fixes).
- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).
- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).
- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).
- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).
- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).
- staging: vc04_services: shut up out-of-range warning (git-fixes).
- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).
- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).
- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).
- staging: vchiq: Move vchiq char driver to its own file (git-fixes).
- staging: vchiq: Refactor vchiq cdev code (git-fixes).
- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).
- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).
- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).
- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).
- SUNRPC do not resend a task on an offlined transport (git-fixes).
- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).
- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).
- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).
- SUNRPC: Handle low memory situations in call_status() (git-fixes).
- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).
- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).
- SUNRPC: Trap RDMA segment overflows (git-fixes).
- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).
- supported.conf: add intel_sdsi
- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)
- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)
- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).
- swiotlb: max mapping size takes min align mask into account (bsc#1197303).
- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).
- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).
- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).
- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).
- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).
- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).
- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).
- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).
- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).
- thermal: int340x: Fix attr.show callback prototype (git-fixes).
- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).
- thermal: int340x: Increase bitmap size (git-fixes).
- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).
- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).
- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)
- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)
- timers: Fix warning condition in __run_timers() (git-fixes)
- TOMOYO: fix __setup handlers return values (git-fixes).
- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).
- tools: bpftool: Complete metrics list in 'bpftool prog profile' doc (git-fixes).
- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).
- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).
- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).
- tpm: Fix error handling in async work (git-fixes).
- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).
- tpm: use try_get_ops() in tpm-space.c (git-fixes).
- tps6598x: clear int mask on probe failure (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix potential double free in create_var_ref() (git-fixes).
- tracing: Fix return value of __setup handlers (git-fixes).
- tracing: Fix return value of trace_pid_write() (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have trace event string test handle zero length strings (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histogram: Fix sorting on old 'cpu' value (git-fixes).
- tracing/osnoise: Force quiescent states while tracing (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).
- tty: Fix a possible resource leak in icom_probe (git-fixes).
- tty: fix deadlock caused by calling printk() under tty_port->lock (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).
- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).
- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).
- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).
- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).
- tty: n_gsm: Fix packet data hex dump output (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).
- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).
- tty: n_tty: Restore EOF push handling behavior (git-fixes).
- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).
- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).
- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).
- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).
- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).
- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).
- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).
- udmabuf: validate ubuf->pagecount (git-fixes).
- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).
- usb: cdc-wdm: fix reading stuck on device close (git-fixes).
- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).
- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).
- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: dwc2: gadget: do not reset gadget's driver->bus (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).
- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).
- usb: dwc3: Decouple USB 2.0 L1 & L2 events (git-fixes).
- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).
- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).
- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).
- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Return proper request status (git-fixes).
- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).
- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).
- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).
- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).
- usb: dwc3: omap: fix 'unbalanced disables for smps10_out1' on omap5evm (git-fixes).
- usb: dwc3: pci: Add 'snps,dis_u2_susphy_quirk' for Intel Bay Trail (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).
- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).
- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).
- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).
- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).
- usb: ehci: add pci device support for Aspeed platforms (git-fixes).
- usb: ehci-omap: drop unused ehci_read() function (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).
- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).
- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).
- usb: gadget: f_fs: change ep->ep safe in ffs_epfile_io() (git-fixes).
- usb: gadget: f_fs: change ep->status safe in ffs_epfile_io() (git-fixes).
- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).
- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).
- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).
- usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).
- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).
- usb: gadget: tegra-xudc: Fix control endpoint's definitions (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).
- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).
- usb: gadget: uvc: rename function to be more consistent (git-fixes).
- usb: gadget: validate endpoint index for xilinx udc (git-fixes).
- usb: gadget: validate interface OS descriptor requests (git-fixes).
- USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).
- USB: host: isp116x: check return value after calling platform_get_resource() (git-fixes).
- usb: isp1760: Fix out-of-bounds array access (git-fixes).
- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).
- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).
- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: new quirk for Dell Gen 2 devices (git-fixes).
- usb: phy: generic: Get the vbus supply (git-fixes).
- usb: quirks: add a Realtek card reader (git-fixes).
- usb: quirks: add STRING quirk for VCOM device (git-fixes).
- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).
- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).
- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).
- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- usb: serial: option: add Fibocom L610 modem (git-fixes).
- usb: serial: option: add Fibocom MA510 modem (git-fixes).
- USB: serial: option: add Quectel BG95 modem (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).
- usb: serial: option: add support for DW5829e (git-fixes).
- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: serial: option: add Telit LE910R1 compositions (git-fixes).
- usb: serial: option: add ZTE MF286D modem (git-fixes).
- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).
- usb: serial: pl2303: add IBM device IDs (git-fixes).
- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).
- usb: serial: pl2303: fix GS type detection (git-fixes).
- usb: serial: pl2303: fix type detection for odd device (git-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).
- usb: serial: simple: add Nokia phone driver (git-fixes).
- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).
- usb: storage: karma: fix rio_karma_init return (git-fixes).
- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).
- usb: typec: mux: Check dev_set_name() return value (git-fixes).
- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).
- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).
- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).
- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).
- usb: typec: ucsi: Fix role swapping (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).
- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).
- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).
- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).
- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).
- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).
- usb: zaurus: support another broken Zaurus (git-fixes).
- use jobs not processors in the constraints jobs is the number of vcpus available to the build, while processors is the total processor count of the machine the VM is running on.
- vdpasim: allow to enable a vq repeatedly (git-fixes).
- veth: Ensure eth header is in skb's linear part (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).
- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).
- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).
- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).
- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).
- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).
- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).
- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).
- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).
- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).
- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).
- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).
- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).
- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).
- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).
- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).
- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)
- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).
- video: fbdev: w100fb: Reset global state (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).
- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).
- virtio_console: break out of buf poll on remove (git-fixes).
- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).
- virtio: fix virtio transitional ids (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix for skb_over_panic inside big mode (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-net: realign page_to_skb() after merges (git-fixes).
- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).
- vringh: Fix loop descriptors check in the indirect cases (git-fixes).
- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).
- vsprintf: Fix potential unaligned access (bsc#1198379).
- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).
- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).
- vxcan: enable local echo for sent CAN frames (git-fixes).
- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).
- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).
- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).
- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).
- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).
- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).
- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).
- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).
- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).
- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).
- watch_queue: Actually free the watch (git-fixes).
- watch_queue: Fix NULL dereference in error cleanup (git-fixes).
- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).
- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).
- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).
- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).
- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).
- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).
- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).
- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).
- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).
- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).
- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).
- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).
- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).
- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).
- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).
- x86/entry: Remove skip_r11rcx (bsc#1201524).
- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).
- x86/ibt,xen: Sprinkle the ENDBR (bsc#1201471).
- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).
- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).
- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).
- x86/kvmclock: Fix Hyper-V Isolated VM s boot issue when vCPUs 64 (bsc#1183682).
- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).
- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).
- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).
- x86/module: Fix the paravirt vs alternative order (bsc#1190497).
- x86/pm: Save the MSR validity status at context setup (bsc#1190497).
- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).
- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).
- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).
- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).
- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).
- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).
- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).
- xen/blkfront: fix comment for need_copy (git-fixes).
- xen: fix is_xen_pmu() (git-fixes).
- xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).
- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).
- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).
- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).
- xfs: drop async cache flushes from CIL commits (bsc#1195669).
- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).
- xhci: Enable runtime PM on second Alderlake controller (git-fixes).
- xhci: fix garbage USBSTS being logged in some cases (git-fixes).
- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).
- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).
- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).
- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
- xhci: stop polling roothubs after shutdown (git-fixes).
- xhci: turn off port power in shutdown (git-fixes).
- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).
- zsmalloc: decouple class actions from zspage works (bsc#1189998).
- zsmalloc: introduce obj_allocated (bsc#1189998).
- zsmalloc: introduce some helper functions (bsc#1189998).
- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).
- zsmalloc: remove zspage isolation for migration (bsc#1189998).
- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).
- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).
- zsmalloc: replace per zpage lock with poolmigrate_lock (bsc#1189998).
- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).
Patchnames
SUSE-2022-2520,SUSE-SLE-Module-Basesystem-15-SP4-2022-2520,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2520,SUSE-SLE-Module-Legacy-15-SP4-2022-2520,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2520,SUSE-SLE-Product-HA-15-SP4-2022-2520,SUSE-SLE-Product-WE-15-SP4-2022-2520,openSUSE-SLE-15.4-2022-2520
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bnc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bnc#1200619).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-1998: Fixed a use after free in the file system notify functionality (bnc#1200284).\n- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)\n- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)\n- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)\n- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)\n- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)\n- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)\n- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)\n- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)\n- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)\n- CVE-2022-0264: Fixed a vulnerability in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI/APEI: Limit printable size of BERT table data (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).\n- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).\n- ACPI: PM: Revert \u0027Only mark EC GPE for wakeup on Intel systems\u0027 (git-fixes).\n- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).\n- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).\n- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).\n- ACPI: processor idle: Check for architectural support for LPI (git-fixes).\n- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).\n- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).\n- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).\n- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).\n- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).\n- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).\n- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).\n- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).\n- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).\n- ALSA: hda: Fix driver index handling at re-binding (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).\n- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).\n- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).\n- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).\n- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).\n- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).\n- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).\n- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).\n- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).\n- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).\n- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).\n- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Set max DMA segment size (git-fixes).\n- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).\n- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).\n- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).\n- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).\n- ALSA: pcm: Test for \u0027silence\u0027 field in struct \u0027pcm_format_data\u0027 (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).\n- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).\n- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).\n- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).\n- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).\n- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).\n- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).\n- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).\n- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- ALSA: usb-audio: Increase max buffer size (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).\n- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).\n- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).\n- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).\n- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).\n- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).\n- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).\n- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).\n- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).\n- ALSA: wavefront: Proper check of get_user() error (git-fixes).\n- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).\n- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).\n- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).\n- amd/display: set backlight only if required (git-fixes).\n- arch/arm64: Fix topology initialization for core scheduling (git-fixes).\n- arm64: Add Cortex-A510 CPU part definition (git-fixes).\n- arm64: Add part number for Arm Cortex-A78AE (git-fixes).\n- arm64: Add support for user sub-page fault probing (git-fixes)\n- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).\n- arm64: avoid fixmap race condition when create pud mapping (git-fixes).\n- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).\n- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).\n- arm64: defconfig: build imx-sdma as a module (git-fixes).\n- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).\n- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).\n- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).\n- arm64: dts: agilex: use the compatible \u0027intel,socfpga-agilex-hsotg\u0027 (git-fixes).\n- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).\n- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).\n- arm64: dts: broadcom: Fix sata nodename (git-fixes).\n- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)\n- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)\n- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)\n- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).\n- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 \u0026 mmc settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).\n- arm64: dts: imx8mq: fix lcdif port node (git-fixes).\n- arm64: dts: imx8qm: Correct SCU clock controller\u0027s compatible (git-fixes)\n- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).\n- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).\n- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).\n- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).\n- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).\n- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).\n- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson-g12b-odroid-n2: fix typo \u0027dio2133\u0027 (git-fixes).\n- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).\n- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).\n- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).\n- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).\n- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).\n- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).\n- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).\n- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).\n- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).\n- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).\n- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).\n- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).\n- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).\n- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel\u0027s vddio-supply property (git-fixes).\n- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).\n- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).\n- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).\n- arm64: dts: renesas: Fix thermal bindings (git-fixes).\n- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).\n- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).\n- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).\n- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- arm64: dts: ti: j7200-main: Fix \u0027dtbs_check\u0027 serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: j721e-main: Fix \u0027dtbs_check\u0027 in serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).\n- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).\n- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).\n- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).\n- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)\n- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).\n- arm64: fix types in copy_highpage() (git-fixes).\n- arm64: ftrace: consistently handle PLTs (git-fixes).\n- arm64: ftrace: fix branch range checks (git-fixes).\n- arm64: kasan: fix include error in MTE functions (git-fixes).\n- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).\n- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)\n- arm64: mm: Drop \u0027const\u0027 from conditional arm64_dma_phys_limit definition (git-fixes).\n- arm64: mm: fix p?d_leaf() (git-fixes).\n- arm64: module: remove (NOLOAD) from linker script (git-fixes).\n- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).\n- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).\n- arm64: patch_text: Fixup last cpu should be master (git-fixes).\n- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: stackleak: fix current_top_of_stack() (git-fixes).\n- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)\n- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).\n- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).\n- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module\n- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).\n- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).\n- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).\n- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).\n- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).\n- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).\n- ARM: at91: pm: use proper compatible for sama5d2\u0027s rtc (git-fixes).\n- ARM: at91: pm: use proper compatibles for sam9x60\u0027s rtc and rtt (git-fixes).\n- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).\n- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).\n- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).\n- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).\n- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).\n- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).\n- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).\n- ARM: dts: aspeed: Add secure boot controller node (git-fixes).\n- ARM: dts: aspeed: Add video engine to g6 (git-fixes).\n- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).\n- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).\n- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).\n- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).\n- ARM: dts: at91: fix pinctrl phandles (git-fixes).\n- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).\n- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).\n- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).\n- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).\n- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).\n- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).\n- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).\n- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).\n- ARM: dts: BCM5301X: update CRU block description (git-fixes).\n- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).\n- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).\n- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).\n- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).\n- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).\n- ARM: dts: Fix boot regression on Skomer (git-fixes).\n- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).\n- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).\n- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).\n- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).\n- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).\n- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).\n- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).\n- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).\n- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).\n- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).\n- ARM: dts: imx7ulp: Fix \u0027assigned-clocks-parents\u0027 typo (git-fixes).\n- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).\n- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)\n- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).\n- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).\n- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson: Fix the UART compatible strings (git-fixes).\n- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).\n- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).\n- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).\n- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).\n- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).\n- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).\n- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).\n- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).\n- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).\n- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: socfpga: change qspi to \u0027intel,socfpga-qspi\u0027 (git-fixes).\n- ARM: dts: spear1340: Update serial node properties (git-fixes).\n- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).\n- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).\n- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).\n- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).\n- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).\n- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).\n- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).\n- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).\n- ARM: fix build warning in proc-v7-bugs.c (git-fixes).\n- ARM: fix co-processor register typo (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).\n- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).\n- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).\n- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).\n- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).\n- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).\n- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).\n- ARM: mediatek: select arch timer for mt7629 (git-fixes).\n- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).\n- ARM: mmp: Fix failure to remove sram device (git-fixes).\n- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).\n- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).\n- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).\n- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).\n- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).\n- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).\n- ARM: pxa: maybe fix gpio lookup tables (git-fixes).\n- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).\n- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).\n- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).\n- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).\n- ASoC: amd: Fix reference to PCM buffer address (git-fixes).\n- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).\n- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).\n- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).\n- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).\n- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).\n- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).\n- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).\n- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).\n- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).\n- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: fsl: Use dev_err_probe() helper (git-fixes).\n- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).\n- ASoC: intel: skylake: Set max DMA segment size (git-fixes).\n- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).\n- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13\u0027 (git-fixes).\n- ASoC: madera: Add dependencies on MFD (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).\n- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).\n- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).\n- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).\n- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).\n- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).\n- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).\n- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).\n- ASoC: mediatek: use of_device_get_match_data() (git-fixes).\n- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).\n- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).\n- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).\n- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).\n- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).\n- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).\n- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).\n- ASoC: rt5514: Fix event generation for \u0027DSP Voice Wake Up\u0027 control (git-fixes).\n- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).\n- ASoC: samsung: Use dev_err_probe() helper (git-fixes).\n- ASoC: simple-card: fix probe failure on platform component (git-fixes).\n- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).\n- ASoC: soc-compress: Change the check for codec_dai (git-fixes).\n- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).\n- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).\n- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).\n- ASoC: soc-ops: fix error handling (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).\n- ASoC: SOF: hda: Set max DMA segment size (git-fixes).\n- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).\n- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).\n- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).\n- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: tas2770: Insert post reset delay (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).\n- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect (git-fixes).\n- asus-wmi: Add dgpu disable method (bsc#1198058).\n- asus-wmi: Add egpu enable method (bsc#1198058).\n- asus-wmi: Add panel overdrive functionality (bsc#1198058).\n- asus-wmi: Add support for platform_profile (bsc#1198058).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ata: pata_hpt37x: fix PCI clock detection (git-fixes).\n- ata: pata_marvell: Check the \u0027bmdma_addr\u0027 beforing reading (git-fixes).\n- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).\n- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).\n- ath11k: acquire ab-\u003ebase_lock in unassign when finding the peer by addr (git-fixes).\n- ath11k: disable spectral scan during spectral deinit (git-fixes).\n- ath11k: Do not check arvif-\u003eis_started before sending management frames (git-fixes).\n- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).\n- ath11k: mhi: use mhi_sync_power_up() (git-fixes).\n- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).\n- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- ath9k: fix ar9003_get_eepmisc (git-fixes).\n- ath9k: fix QCA9561 PA bias level (git-fixes).\n- ath9k: Fix usage of driver-private space in tx_info (git-fixes).\n- ath9k_htc: fix potential out of bounds access with invalid rxstatus-\u003ers_keyix (git-fixes).\n- ath9k_htc: fix uninit value bugs (git-fixes).\n- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).\n- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).\n- atm: eni: Add check for dma_map_single (git-fixes).\n- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).\n- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).\n- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (git-fixes).\n- audit: improve robustness of the audit queue handling (git-fixes).\n- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).\n- auxdisplay: lcd2s: Fix memory leak in -\u003eremove() (git-fixes).\n- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- b43: Fix assigning negative value to unsigned variable (git-fixes).\n- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).\n- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bfq: Allow current waker to defend against a tentative one (bsc#1195915).\n- bfq: Avoid false marking of bic as stably merged (bsc#1197926).\n- bfq: Avoid merging queues with different parents (bsc#1197926).\n- bfq: Do not let waker requests skip proper accounting (bsc#1184318).\n- bfq: Drop pointless unlock-lock pair (bsc#1197926).\n- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).\n- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).\n- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).\n- bfq: Limit waker detection in time (bsc#1184318).\n- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).\n- bfq: Relax waker detection for shared queues (bsc#1184318).\n- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).\n- bfq: Split shared queues on move between cgroups (bsc#1197926).\n- bfq: Store full bitmap depth in bfq_data (bsc#1184318).\n- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).\n- bfq: Track whether bfq_group is still online (bsc#1197926).\n- bfq: Update cgroup information before merging bio (bsc#1197926).\n- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).\n- bitfield: add explicit inclusions to the example (git-fixes).\n- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).\n- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).\n- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).\n- blk-mq: do not touch -\u003etagset in blk_mq_get_sq_hctx (bsc#1200824).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: fix tag_get wait task can\u0027t be awakened (bsc#1200263).\n- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).\n- blktrace: fix use after free for struct blk_trace (bsc#1198017).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).\n- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).\n- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).\n- block: do not delete queue kobject before its children (bsc#1198019).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).\n- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).\n- block: Fix up kabi after blkcg merge fix (bsc#1198020).\n- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).\n- block: limit request dispatch loop duration (bsc#1198022).\n- block/mq-deadline: Improve request accounting further (bsc#1198009).\n- block: Provide blk_mq_sched_get_icq() (bsc#1184318).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).\n- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).\n- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).\n- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).\n- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).\n- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).\n- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).\n- Bluetooth: Fix the creation of hdev-\u003ename (git-fixes).\n- Bluetooth: Fix use after free in hci_send_acl (git-fixes).\n- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).\n- Bluetooth: hci_serdev: call init_rwsem() before p-\u003eopen() (git-fixes).\n- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).\n- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).\n- Bluetooth: use memset avoid memory leaks (git-fixes).\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).\n- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).\n- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).\n- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).\n- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).\n- bnxt_en: Increase firmware message response DMA wait time (git-fixes).\n- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).\n- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).\n- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).\n- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).\n- bonding: fix data-races around agg_select_timer (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Add check_func_arg_reg_off function (git-fixes).\n- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).\n- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).\n- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Fix kernel address leakage in atomic cmpxchg\u0027s r0 aux reg (git-fixes).\n- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).\n- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).\n- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).\n- bpf: Resolve to prog-\u003eaux-\u003edst_prog-\u003etype only for BPF_PROG_TYPE_EXT (git-fixes).\n- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#1198585).\n- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).\n- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).\n- bpftool: Fix memory leak in prog_dump() (git-fixes).\n- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).\n- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).\n- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).\n- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).\n- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).\n- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).\n- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).\n- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).\n- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).\n- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).\n- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).\n- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).\n- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).\n- btrfs: add ro compat flags to inodes (bsc#1197915).\n- btrfs: always update the logged transaction when logging new names (bsc#1197915).\n- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).\n- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).\n- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).\n- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).\n- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)\n- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).\n- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).\n- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).\n- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).\n- btrfs: constify and cleanup variables in comparators (bsc#1197915).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).\n- btrfs: do not pin logs too early during renames (bsc#1197915).\n- btrfs: drop the _nr from the item helpers (bsc#1197915).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).\n- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).\n- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).\n- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).\n- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).\n- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).\n- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).\n- btrfs: improve the batch insertion of delayed items (bsc#1197915).\n- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).\n- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).\n- btrfs: introduce item_nr token variant helpers (bsc#1197915).\n- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).\n- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).\n- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).\n- btrfs: only copy dir index keys when logging a directory (bsc#1197915).\n- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).\n- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).\n- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).\n- btrfs: remove root argument from add_link() (bsc#1197915).\n- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).\n- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).\n- btrfs: remove root argument from check_item_in_log() (bsc#1197915).\n- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).\n- btrfs: remove the btrfs_item_end() helper (bsc#1197915).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).\n- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).\n- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).\n- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).\n- btrfs: unexport setup_items_for_insert() (bsc#1197915).\n- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).\n- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).\n- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).\n- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots \u003e nritems (bsc#1197915).\n- btrfs: use single bulk copy operations when logging directories (bsc#1197915).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).\n- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).\n- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: etas_es58x: change opened_channel_cnt\u0027s type from atomic_t to u8 (git-fixes).\n- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).\n- can: grcan: grcan_close(): fix deadlock (git-fixes).\n- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).\n- can: grcan: only use the NAPI poll budget for RX (git-fixes).\n- can: grcan: use ofdev-\u003edev when allocating DMA memory (git-fixes).\n- can: gs_usb: change active_channels\u0027s type from atomic_t to u8 (git-fixes).\n- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).\n- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).\n- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).\n- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).\n- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).\n- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).\n- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).\n- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).\n- can: mcp251xfd: silence clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: rcar_canfd: add __maybe_unused annotation to silence warning (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: xilinx_can: mark bit timing constants as const (git-fixes).\n- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).\n- carl9170: tx: fix an incorrect use of list iterator (git-fixes).\n- CDC-NCM: avoid overflow in sanity checking (git-fixes).\n- ceph: fix setting of xattrs on async created inodes (bsc#1199611).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).\n- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).\n- cfg80211: fix race in netlink owner interface destruction (git-fixes).\n- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).\n- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).\n- cgroup/cpuset: Fix \u0027suspicious RCU usage\u0027 lockdep warning (bsc#1196868).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).\n- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).\n- cifs: avoid parallel session setups on same channel (bsc#1193629).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).\n- cifs: call helper functions for marking channels for reconnect (bsc#1193629).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).\n- cifs: check for smb1 in open_cached_dir() (bsc#1193629).\n- cifs: check reconnects for channels of active tcons too (bsc#1193629).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).\n- cifs: clean up an inconsistent indenting (bsc#1193629).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).\n- cifs: fix bad fids sent over wire (bsc#1197157).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).\n- cifs: fix handlecache and multiuser (bsc#1193629).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).\n- cifs: fix minor compile warning (bsc#1193629).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).\n- cifs: fix potential deadlock in direct reclaim (bsc#1193629).\n- cifs: fix potential double free during failed mount (bsc#1193629).\n- cifs: fix potential race with cifsd thread (bsc#1193629).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).\n- cifs: fix the connection state transitions with multichannel (bsc#1193629).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).\n- cifs: fix workstation_name for multiuser mounts (bsc#1193629).\n- cifs: force new session setup and tcon for dfs (bsc#1193629).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).\n- cifs: make status checks in version independent callers (bsc#1193629).\n- cifs: mark sessions for reconnection in helper function (bsc#1193629).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).\n- cifs: move superblock magic defitions to magic.h (bsc#1193629).\n- cifs: potential buffer overflow in handling symlinks (bsc#1193629).\n- cifs: print TIDs as hex (bsc#1193629).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).\n- cifs: release cached dentries only if mount is complete (bsc#1193629).\n- cifs: remove check of list iterator against head past the loop body (bsc#1193629).\n- cifs: remove redundant assignment to pointer p (bsc#1193629).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).\n- cifs: remove repeated state change in dfs tree connect (bsc#1193629).\n- cifs: remove unused variable ses_selected (bsc#1193629).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).\n- cifs: return the more nuanced writeback error on close() (bsc#1193629).\n- cifs: serialize all mount attempts (bsc#1193629).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).\n- cifs: skip trailing separators of prefix paths (bsc#1193629).\n- cifs: smbd: fix typo in comment (bsc#1193629).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).\n- cifs: use new enum for ses_status (bsc#1193629).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).\n- cifs: writeback fix (bsc#1193629).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: at91: generated: consider range when calculating best rate (git-fixes).\n- clk: at91: sama7g5: fix parents of PDMCs\u0027 GCLK (git-fixes).\n- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: Enforce that disjoints limits are invalid (git-fixes).\n- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).\n- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: imx8mp: fix usb_root_clk parent (git-fixes).\n- clk: imx: Add check for kcalloc (git-fixes).\n- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).\n- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).\n- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).\n- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).\n- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).\n- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).\n- clk: tegra: Add missing reset deassertion (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).\n- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).\n- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).\n- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).\n- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).\n- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).\n- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).\n- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).\n- copy_process(): Move fd_install() out of sighand-\u003esiglock critical section (bsc#1199626).\n- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).\n- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).\n- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).\n- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- crypto: amlogic - call finalize with bh disabled (git-fixes).\n- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).\n- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).\n- crypto: ccree - use fine grained DMA mapping dir (git-fixes).\n- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).\n- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).\n- crypto: engine - check if BH is disabled during completion (git-fixes).\n- crypto: gemini - call finalize with bh disabled (git-fixes).\n- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).\n- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).\n- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).\n- crypto: marvell/cesa - ECB does not IV (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).\n- crypto: qat - disable registration of algorithms (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).\n- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).\n- crypto: rockchip - ECB does not need IV (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).\n- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - handle zero sized sg (git-fixes).\n- crypto: sun8i-ss - really disable hash on A80 (git-fixes).\n- crypto: sun8i-ss - rework handling of IV (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).\n- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).\n- crypto: xts - Add softdep on ecb (git-fixes).\n- dax: fix cache flush on PMD-mapped pages (bsc#1200830).\n- devlink: Add \u0027enable_iwarp\u0027 generic device param (bsc#1200502).\n- dim: initialize all struct fields (git-fixes).\n- display/amd: decrease message verbosity about watermarks table failure (git-fixes).\n- dma: at_xdmac: fix a missing check on list iterator (git-fixes).\n- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- dma-debug: fix return value of __setup handlers (git-fixes).\n- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).\n- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).\n- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).\n- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).\n- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).\n- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).\n- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).\n- dmaengine: idxd: fix device cleanup on disable (git-fixes).\n- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).\n- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).\n- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).\n- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).\n- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).\n- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).\n- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).\n- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).\n- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).\n- dmaengine: Revert \u0027dmaengine: shdma: Fix runtime PM imbalance on error\u0027 (git-fixes).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).\n- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).\n- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).\n- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).\n- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).\n- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).\n- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).\n- doc/ip-sysctl: add bc_forwarding (git-fixes).\n- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).\n- Documentation: add link to stable release candidate tree (git-fixes).\n- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).\n- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).\n- Documentation: update stable tree link (git-fixes).\n- do not call utsname() after -\u003ensproxy is NULL (bsc#1201196).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).\n- driver base: fix compaction sysfs file leak (git-fixes).\n- driver: base: fix UAF when driver_attach failed (git-fixes).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- driver core: fix deadlock in __device_attach (git-fixes).\n- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).\n- driver core: Free DMA range map when device is released (git-fixes).\n- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).\n- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).\n- driver: hv: Rename \u0027alloced\u0027 to \u0027allocated\u0027 (git-fixes).\n- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).\n- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).\n- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).\n- driver: net: xgene: Fix regression in CRC stripping (git-fixes).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).\n- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).\n- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).\n- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).\n- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).\n- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).\n- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: Add orientation quirk for GPD Win Max (git-fixes).\n- drm/amd: Add USBC connector ID (git-fixes).\n- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).\n- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).\n- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).\n- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).\n- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).\n- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).\n- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).\n- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).\n- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).\n- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).\n- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).\n- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).\n- drm/amd/display: Enable power gating before init_pipes (git-fixes).\n- drm/amd/display: FEC check in timing validation (git-fixes).\n- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).\n- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).\n- drm/amd/display: fix audio format not updated after edid updated (git-fixes).\n- drm/amd/display: Fix memory leak (git-fixes).\n- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)\n- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).\n- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).\n- drm/amd/display: fix yellow carp wm clamping (git-fixes).\n- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15\u0027 Apple Retina panels (git-fixes).\n- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).\n- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).\n- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).\n- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).\n- drm/amd/display: Revert FEC check in validation (git-fixes).\n- drm/amd/display: Update VTEM Infopacket definition (git-fixes).\n- drm/amd/display: Update watermark values for DCN301 (git-fixes).\n- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).\n- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).\n- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).\n- drm/amdgpu: add beige goby PCI ID (git-fixes).\n- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).\n- drm/amdgpu: check vm ready by amdgpu_vm-\u003eevicting flag (git-fixes).\n- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).\n- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/amdgpu/display: add support for multiple backlights (git-fixes).\n- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).\n- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).\n- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).\n- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).\n- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).\n- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).\n- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).\n- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).\n- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).\n- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).\n- drm/amdgpu: Fix recursive locking warning (git-fixes).\n- drm/amdgpu: fix suspend/resume hang regression (git-fixes).\n- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).\n- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).\n- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).\n- drm/amdgpu: suppress the warning about enum value \u0027AMD_IP_BLOCK_TYPE_NUM\u0027 (git-fixes).\n- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).\n- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).\n- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).\n- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).\n- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).\n- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)\n- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).\n- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).\n- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).\n- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).\n- drm/amdkfd: Fix GWS queue count (bsc#1190786)\n- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).\n- drm/amdkfd: make CRAT table missing message informational only (git-fixes).\n- drm/amdkfd: remove unused function (git-fixes).\n- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).\n- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).\n- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).\n- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).\n- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).\n- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).\n- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).\n- drm/amd/pm: Fix missing thermal throttler status (git-fixes).\n- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).\n- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).\n- drm/ast: Create threshold values for AST2600 (bsc#1190786)\n- drm/atomic: Do not pollute crtc_state-\u003emode_blob with error pointers (git-fixes).\n- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).\n- drm: avoid circular locks in drm_mode_getconnector (git-fixes).\n- drm/blend: fix typo in the comment (git-fixes).\n- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).\n- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).\n- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).\n- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).\n- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).\n- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).\n- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).\n- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).\n- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)\n- drm: bridge: icn6211: Fix register layout (git-fixes).\n- drm: bridge: it66121: Fix the register page length (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)\n- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).\n- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).\n- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).\n- drm/connector: Fix typo in output format (bsc#1190786)\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/edid: check basic audio support on CEA extension block (git-fixes).\n- drm/edid: Do not clear formats if using deep color (git-fixes).\n- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)\n- drm/edid: fix invalid EDID extension block filtering (git-fixes).\n- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).\n- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).\n- drm/fourcc: fix integer type usage in uapi header (git-fixes).\n- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).\n- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).\n- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).\n- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).\n- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).\n- drm/i915/display: Move DRRS code its own file (git-fixes).\n- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).\n- drm/i915/display: split out dpt out of intel_display.c (git-fixes).\n- drm/i915/dmc: Add MMIO range restrictions (git-fixes).\n- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).\n- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)\n- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)\n- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/i915/gem: add missing else (git-fixes).\n- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).\n- drm/i915: Keep gem ctx-\u003evm alive until the final put (bsc#1190497)\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).\n- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).\n- drm/i915/ttm: ensure we unmap when purging (git-fixes).\n- drm/i915/ttm: tweak priority hint selection (git-fixes).\n- drm/i915: Widen the QGV point mask (git-fixes).\n- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).\n- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).\n- drm: imx: fix compiler warning with gcc-12 (git-fixes).\n- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).\n- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).\n- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).\n- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).\n- drm: mali-dp: potential dereference of null pointer (git-fixes).\n- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)\n- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).\n- drm/mediatek: Fix mtk_cec_mask() (git-fixes).\n- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops-\u003einit fails (git-fixes).\n- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).\n- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).\n- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).\n- drm/msm: add missing include to msm_drv.c (git-fixes).\n- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).\n- drm/msm/disp: check the return value of kzalloc() (git-fixes).\n- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)\n- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).\n- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).\n- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).\n- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).\n- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).\n- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)\n- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).\n- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).\n- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).\n- drm/msm/dp: force link training for display resolution change (git-fixes).\n- drm/msm/dp: Modify prototype of encoder based API (git-fixes).\n- drm/msm/dp: populate connector of struct dp_panel (git-fixes).\n- drm/msm/dp: remove fail safe mode related code (git-fixes).\n- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).\n- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)\n- drm/msm/dp: stop link training after link training 2 failed (git-fixes).\n- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).\n- drm/msm/dpu: fix dp audio condition (git-fixes).\n- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)\n- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).\n- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).\n- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).\n- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).\n- drm/msm/dsi: Use \u0027ref\u0027 fw clock instead of global name for VCO parent (git-fixes).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).\n- drm/msm: Fix range size vs end confusion (git-fixes).\n- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).\n- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/msm/mdp5: check the return of kzalloc() (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).\n- drm/msm: properly add and remove internal bridges (bsc#1190768)\n- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)\n- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).\n- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).\n- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).\n- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).\n- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).\n- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).\n- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).\n- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/panfrost: Check for error num after setting mask (git-fixes).\n- drm/plane: Move range check for format_count earlier (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).\n- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).\n- drm/simpledrm: Add \u0027panel orientation\u0027 property on non-upright mounted LCD panels (git-fixes).\n- drm: sti: do not use kernel-doc markers (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)\n- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).\n- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).\n- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).\n- drm: use the lookup lock in drm_is_current_master (git-fixes).\n- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).\n- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).\n- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).\n- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).\n- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).\n- drm/vc4: hvs: Fix frame count register readout (git-fixes).\n- drm/vc4: hvs: Reset muxes at probe time (git-fixes).\n- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).\n- drm/vc4: txp: Force alpha to be 0xff if it\u0027s disabled (git-fixes).\n- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).\n- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).\n- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).\n- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).\n- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).\n- drm/vmwgfx: Remove unused compile options (bsc#1190786)\n- drm/vmwgfx: validate the screen formats (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).\n- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).\n- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).\n- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).\n- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).\n- dt-bindings: net: xgmac_mdio: Remove unsupported \u0027bus-frequency\u0027 (git-fixes).\n- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).\n- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).\n- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).\n- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).\n- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).\n- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).\n- dt-bindings: usb: hcd: correct usb-device path (git-fixes).\n- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).\n- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).\n- e1000e: Correct NVM checksum verification flow (bsc#1191663).\n- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).\n- e1000e: Fix possible overflow in LTR decoding (git-fixes).\n- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).\n- e1000e: Separate ADP board type from TGP (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1190497).\n- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).\n- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).\n- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).\n- EDAC/xgene: Fix deferred probing (bsc#1190497).\n- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).\n- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).\n- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).\n- efi: fix return value of __setup handlers (git-fixes).\n- efivars: Respect \u0027block\u0027 flag in efivar_entry_set_safe() (git-fixes).\n- epic100: fix use after free on rmmod (git-fixes).\n- ethernet/sfc: remove redundant rc variable (bsc#1196306).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext2: correct max file size computing (bsc#1197820).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix ext4_fc_stats trace point (git-fixes).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- ext4: reject the \u0027commit\u0027 option on ext2 filesystems (bsc#1200808).\n- extcon: Modify extcon device to be created after driver data is set (git-fixes).\n- extcon: ptn5150: Add queue work sync before driver release (git-fixes).\n- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).\n- fbcon: Avoid \u0027cap\u0027 set but not used warning (bsc#1190786)\n- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).\n- firewire: core: extend card-\u003elock in fw_core_handle_bus_reset (git-fixes).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).\n- firewire: remove check of list iterator against head past the loop body (git-fixes).\n- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).\n- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).\n- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).\n- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).\n- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).\n- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).\n- firmware: sysfb: fix platform-device leak in error path (git-fixes).\n- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).\n- firmware: use kernel credentials when reading firmware (git-fixes).\n- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).\n- fs: fix fd table size alignment properly (bsc#1200882).\n- fs: handle circular mappings correctly (bsc#1197918).\n- fsl_lpuart: Do not enable interrupts too early (git-fixes).\n- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).\n- fsnotify: fix wrong lockdep annotations (bsc#1200815).\n- ftrace: Clean up hash direct_functions on register failures (git-fixes).\n- fuse: fix fileattr op failure (bsc#1197292).\n- gen_init_cpio: fix short read file handling (bsc#1193289).\n- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)\n- genirq: Synchronize interrupt thread startup (git-fixes)\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gma500: fix an incorrect NULL check on list iterator (git-fixes).\n- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).\n- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).\n- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).\n- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpiolib: acpi: use correct format characters (git-fixes).\n- gpiolib: Never return internal error codes to user space (git-fixes).\n- gpiolib: of: fix bounds check for \u0027gpio-reserved-ranges\u0027 (git-fixes).\n- gpio: mvebu: drop pwm base assignment (git-fixes).\n- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).\n- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).\n- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).\n- gpio: Return EPROBE_DEFER if gc-\u003eto_irq is NULL (git-fixes).\n- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).\n- gpio: sifive: use the correct register to read output values (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027 (git-fixes).\n- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).\n- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: fix the wrong AdminQ buffer queue index check (git-fixes).\n- habanalabs: Add check for pci_enable_device (git-fixes).\n- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- hex2bin: fix access beyond string end (git-fixes).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- HID: Add support for open wheel and no attachment to T300 (git-fixes).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).\n- HID: amd_sfh: Correct the structure field name (git-fixes).\n- HID: amd_sfh: Modify the bus name (git-fixes).\n- HID: amd_sfh: Modify the hid name (git-fixes).\n- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).\n- hide appended member supports_dynamic_smps_6ghz (git-fixes).\n- HID: elan: Fix potential double free in elan_input_configured (git-fixes).\n- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).\n- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).\n- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).\n- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).\n- HID: logitech-dj: add new lightspeed receiver id (git-fixes).\n- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).\n- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- HID: vivaldi: fix sysfs attributes leak (git-fixes).\n- hinic: fix bug of wq out of bound access (git-fixes).\n- hv_balloon: rate-limit \u0027Unhandled message\u0027 warning (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).\n- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).\n- hwmon: (f71882fg) Fix negative temperature (git-fixes).\n- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).\n- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).\n- hwmon: (pmbus) disable PEC if not enabled (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwmon: (tmp401) Add OF device ID table (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - Check health status while reading random data (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).\n- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).\n- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).\n- i2c: at91: use dma safe buffers (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- i2c: bcm2835: Fix the error handling in \u0027bcm2835_i2c_probe()\u0027 (git-fixes).\n- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i2c: cadence: Increase timeout per message if necessary (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).\n- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).\n- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).\n- i2c: meson: Fix wrong speed use from probe (git-fixes).\n- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).\n- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).\n- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).\n- i2c: npcm: Correct register access width (git-fixes).\n- i2c: npcm: Fix timeout calculation (git-fixes).\n- i2c: npcm: Handle spurious interrupts (git-fixes).\n- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).\n- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).\n- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).\n- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).\n- i2c: piix4: Move SMBus port selection into function (git-fixes).\n- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).\n- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).\n- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).\n- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).\n- i2c: xiic: Make bus names unique (git-fixes).\n- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40e: i40e_main: fix a missing check on list iterator (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).\n- i40e: respect metadata on XSK Rx to skb (git-fixes).\n- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).\n- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).\n- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).\n- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).\n- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).\n- iavf: Fix init state closure on remove (jsc#SLE-18385).\n- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).\n- iavf: Fix missing check for running netdev (git-fixes).\n- iavf: Fix race in init state (jsc#SLE-18385).\n- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).\n- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).\n- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).\n- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).\n- IB/hfi1: Allow larger MTU without AIP (git-fixes).\n- IB/hfi1: Fix AIP early init panic (git-fixes).\n- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).\n- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).\n- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).\n- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- IB/qib: Fix duplicate sysfs directory name (git-fixes).\n- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).\n- ice: check the return of ice_ptp_gettimex64 (git-fixes).\n- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).\n- ice: Clear default forwarding VSI during VSI release (git-fixes).\n- ice: clear stale Tx queue settings before configuring (git-fixes).\n- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).\n- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ice: Do not use GFP_KERNEL in atomic context (git-fixes).\n- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).\n- ice: fix concurrent reset and removal of VFs (git-fixes).\n- ice: fix crash in switchdev mode (jsc#SLE-18375).\n- ice: Fix curr_link_speed advertised speed (git-fixes).\n- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).\n- ice: fix PTP stale Tx timestamps cleanup (git-fixes).\n- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).\n- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).\n- ice: initialize local variable \u0027tlv\u0027 (git-fixes).\n- ice: kabi protect ice_pf (bsc#1200502).\n- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: respect metadata on XSK Rx to skb (git-fixes).\n- ice: synchronize_rcu() when terminating rings (git-fixes).\n- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).\n- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).\n- igb: refactor XDP registration (git-fixes).\n- igc: avoid kernel warning when changing RX ring parameters (git-fixes).\n- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- igc: Fix BUG: scheduling while atomic (git-fixes).\n- igc: Fix infinite loop in release_swfw_sync (git-fixes).\n- igc: Fix suspending when PTM is active (jsc#SLE-18377).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).\n- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).\n- iio: adc: ad7124: Remove shift from scan_type (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).\n- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).\n- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).\n- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).\n- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).\n- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).\n- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).\n- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio: afe: rescale: Fix boolean logic bug (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).\n- iio: dac: ad5592r: Fix the missing return value (git-fixes).\n- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).\n- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).\n- iio:imu:bmi160: disable regulator in error path (git-fixes).\n- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).\n- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).\n- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).\n- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).\n- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).\n- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).\n- iio: st_sensors: Add a local lock for protecting odr (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: fix reference leak in asymmetric_verify() (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- init: call time_init() before rand_initialize() (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- init/main.c: return 1 from handled __setup() functions (git-fixes).\n- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: add bounds checking to input_set_capability() (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).\n- Input: ili210x - fix reset timing (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).\n- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).\n- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).\n- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).\n- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).\n- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).\n- Input: synaptics: retry query upon error (bsc#1194086).\n- Input: wm97xx: Simplify resource management (git-fixes).\n- Input: zinitix - do not report shadow fingers (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).\n- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).\n- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).\n- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).\n- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).\n- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- ionic: add FW_STOPPING state (git-fixes).\n- ionic: Allow flexibility for error reporting on dev commands (git-fixes).\n- ionic: better handling of RESET event (git-fixes).\n- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).\n- ionic: Cleanups in the Tx hotpath code (git-fixes).\n- ionic: Correctly print AQ errors if completions are not received (git-fixes).\n- ionic: disable napi when ionic_lif_init() fails (git-fixes).\n- ionic: Do not send reset commands if FW isn\u0027t running (git-fixes).\n- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).\n- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).\n- ionic: fix up printing of timeout error (git-fixes).\n- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).\n- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).\n- ionic: remove the dbid_inuse bitmap (git-fixes).\n- ionic: replace set_vf data with union (git-fixes).\n- ionic: start watchdog after all is setup (git-fixes).\n- ionic: stretch heartbeat detection (git-fixes).\n- io_uring: add more locking annotations for submit (bsc#1199011).\n- io_uring: avoid touching inode in rw prep (bsc#1199011).\n- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).\n- io_uring: cache __io_free_req()\u0027d requests (bsc#1199011).\n- io_uring: clean io-wq callbacks (bsc#1199011).\n- io_uring: clean up tctx_task_work() (bsc#1199011).\n- io_uring: deduplicate open iopoll check (bsc#1199011).\n- io_uring: do not halt iopoll too early (bsc#1199011).\n- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).\n- io_uring: extract a helper for ctx quiesce (bsc#1199011).\n- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).\n- io_uring: improve ctx hang handling (bsc#1199011).\n- io_uring: inline fixed part of io_file_get() (bsc#1199011).\n- io_uring: inline io_free_req_deferred (bsc#1199011).\n- io_uring: inline io_poll_remove_waitqs (bsc#1199011).\n- io_uring: inline struct io_comp_state (bsc#1199011).\n- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).\n- io_uring: move io_fallback_req_func() (bsc#1199011).\n- io_uring: move io_put_task() definition (bsc#1199011).\n- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).\n- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).\n- io_uring: optimise putting task struct (bsc#1199011).\n- io_uring: refactor io_alloc_req (bsc#1199011).\n- io_uring: remove extra argument for overflow flush (bsc#1199011).\n- io_uring: remove file batch-get optimisation (bsc#1199011).\n- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).\n- io_uring: remove redundant args from cache_free (bsc#1199011).\n- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).\n- io_uring: rename io_file_supports_async() (bsc#1199011).\n- io_uring: run linked timeouts from task_work (bsc#1199011).\n- io_uring: run regular file completions from task_work (bsc#1199011).\n- io_uring: run timeouts from task_work (bsc#1199011).\n- io_uring: use inflight_entry instead of compl.list (bsc#1199011).\n- io_uring: use kvmalloc for fixed files (bsc#1199011).\n- io-wq: get rid of FIXED worker flag (bsc#1199011).\n- io-wq: make worker creation resilient against signals (bsc#1199011).\n- io-wq: move nr_running and worker_refs out of wqe-\u003elock protection (bsc#1199011).\n- io-wq: only exit on fatal signals (bsc#1199011).\n- io-wq: provide a way to limit max number of workers (bsc#1199011).\n- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).\n- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).\n- ipc/sem: do not sleep with a spin lock held (bsc#1198412).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: bail out if init_srcu_struct fails (git-fixes).\n- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).\n- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).\n- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).\n- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).\n- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).\n- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).\n- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).\n- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).\n- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).\n- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).\n- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).\n- irqchip/nvic: Release nvic_base upon failure (git-fixes).\n- irqchip/qcom-pdc: Fix broken locking (git-fixes).\n- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).\n- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).\n- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).\n- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).\n- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).\n- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).\n- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).\n- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).\n- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).\n- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).\n- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).\n- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).\n- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).\n- iwlwifi: mvm: move only to an enabled channel (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).\n- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).\n- ixgbe: respect metadata on XSK Rx to skb (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI: fix change of iscsi_host_remove() arguments (bsc#1198410).\n- kABI: Fix kABI after \u0027x86/mm/cpa: Generalize __set_memory_enc_pgtable()\u0027 (jsc#SLE-19924).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kABI: fix removal of iscsi_destroy_conn (bsc#1198410).\n- kABI: fix rndis_parameters locking (git-fixes).\n- kABI: ivtv: restore caps member (git-fixes).\n- kabi/severities: add exception for bcache symboles\n- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)\n- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.\n- kABI workaround for fxls8962af iio accel drivers (git-fixes).\n- kABI workaround for pci quirks (git-fixes).\n- kconfig: fix failing to generate auto.conf (git-fixes).\n- kconfig: let \u0027shell\u0027 return enough output for deep path names (git-fixes).\n- kernel/fork: Initialize mm\u0027s PASID (jsc#SLE-24350).\n- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).\n- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).\n- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).\n- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).\n- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).\n- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).\n- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).\n- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).\n- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).\n- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).\n- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).\n- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).\n- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).\n- kprobes: treewide: Use \u0027kprobe_opcode_t *\u0027 for the code address in get_optimized_kprobe() (bsc#1193277).\n- kselftest/arm64: bti: force static linking (git-fixes).\n- kunit: tool: Import missing importlib.abc (git-fixes).\n- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).\n- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).\n- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).\n- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).\n- KVM: Clean up benign vcpu-\u003ecpu data races when kicking vCPUs (git-fixes).\n- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).\n- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).\n- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).\n- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).\n- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).\n- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants \u0027em (git-fixes).\n- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).\n- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).\n- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).\n- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).\n- KVM: s390: pv: add macros for UVC CC values (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: selftests: Do not skip L2\u0027s VMCALL in SMM test for SVM guest (bsc#1194523).\n- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).\n- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).\n- KVM: SEV: do not take kvm-\u003elock when destroying (bsc#1194526).\n- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).\n- KVM: SEV: Mark nested locking of kvm-\u003elock (bsc#1194526).\n- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).\n- KVM: SVM: Allow AVIC support on system w/ physical APIC ID \u003e 255 (bsc#1193823).\n- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).\n- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).\n- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).\n- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).\n- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).\n- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).\n- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).\n- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).\n- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).\n- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).\n- KVM: VMX: Read Posted Interrupt \u0027control\u0027 exactly once per loop iteration (git-fixes).\n- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).\n- KVM: VMX: Remove defunct \u0027nr_active_uret_msrs\u0027 field (git-fixes).\n- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).\n- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).\n- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).\n- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).\n- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).\n- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).\n- KVM: x86: Drop WARNs that assert a triple fault never \u0027escapes\u0027 from L2 (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).\n- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).\n- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).\n- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).\n- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).\n- KVM: x86: Ignore sparse banks size for an \u0027all CPUs\u0027, non-sparse IPI req (git-fixes).\n- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).\n- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).\n- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).\n- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).\n- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).\n- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).\n- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).\n- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).\n- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).\n- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).\n- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).\n- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).\n- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).\n- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).\n- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).\n- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).\n- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).\n- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).\n- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).\n- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).\n- KVM: x86: SVM: move avic definitions from AMD\u0027s spec to svm.h (bsc#1193823 jsc#SLE-24549).\n- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).\n- KVM: x86: Update vCPU\u0027s runtime CPUID on write to MSR_IA32_XSS (git-fixes).\n- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).\n- lib: bitmap: fix many kernel-doc warnings (git-fixes).\n- libbpf: Free up resources used by inner map definition (git-fixes).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (git-fixes).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).\n- list: test: Add a test for list_is_head() (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).\n- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).\n- locking/rwlocks: introduce write_lock_nested (bsc#1189998).\n- LSM: general protection fault in legacy_parse_param (git-fixes).\n- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).\n- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).\n- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).\n- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).\n- mac80211: mlme: check for null after calling kmemdup (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- mac80211: Remove a couple of obsolete TODO (git-fixes).\n- mac80211: Reset MBSSID parameters upon connection (git-fixes).\n- mac80211: treat some SAE auth steps as final (git-fixes).\n- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).\n- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).\n- mailbox: change mailbox-mpfs compatible string (git-fixes).\n- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).\n- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).\n- mailbox: tegra-hsp: Flush whole channel (git-fixes).\n- maple: fix wrong return value of maple_bus_init() (git-fixes).\n- md: Do not set mddev private to NULL in raid0 pers-\u003efree (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md: fix double free of io_acct_set bioset (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- md: Move alloc/free acct bioset in to personality (git-fixes).\n- md/raid5: play nice with PREEMPT_RT (bsc#1189998).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).\n- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).\n- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).\n- media: atomisp: fix bad usage at error handling logic (git-fixes).\n- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).\n- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: camss: csid-170: do not enable unused irqs (git-fixes).\n- media: camss: csid-170: fix non-10bit formats (git-fixes).\n- media: camss: csid-170: remove stray comment (git-fixes).\n- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).\n- media: camss: vfe-170: fix \u0027VFE halt timeout\u0027 error (git-fixes).\n- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).\n- media: cec-adap.c: fix is_configuring state (git-fixes).\n- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).\n- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: cx25821: Fix the warning when removing the module (git-fixes).\n- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).\n- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).\n- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).\n- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).\n- media: hantro: Empty encoder capture buffers by default (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).\n- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).\n- media: hdpvr: initialize dev-\u003eworker at hdpvr_register_videodev (git-fixes).\n- media: i2c: max9286: fix kernel oops when removing module (git-fixes).\n- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).\n- media: i2c: max9286: Use \u0027maxim,gpio-poc\u0027 property (git-fixes).\n- media: i2c: ov5648: Fix lockdep error (git-fixes).\n- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).\n- media: imon: reorganize serialization (git-fixes).\n- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).\n- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).\n- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).\n- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).\n- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).\n- media: ir_toy: free before error exiting (git-fixes).\n- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).\n- media: mexon-ge2d: fixup frames size in registers (git-fixes).\n- media: mtk-vcodec: potential dereference of null pointer (git-fixes).\n- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).\n- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).\n- media: ov5648: Do not pack controls struct (git-fixes).\n- media: ov6650: Add try support to selection API operations (git-fixes).\n- media: ov6650: Fix crop rectangle affected by set format (git-fixes).\n- media: ov6650: Fix set format try processing path (git-fixes).\n- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).\n- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).\n- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).\n- media: Revert \u0027media: em28xx: add missing em28xx_close_extension\u0027 (git-fixes).\n- media: rga: fix possible memory leak in rga_probe (git-fixes).\n- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).\n- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).\n- media: rkvdec: Stop overclocking the decoder (git-fixes).\n- media: rockchip/rga: do proper error checking in probe (git-fixes).\n- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).\n- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).\n- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).\n- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).\n- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).\n- media: staging: media: zoran: move videodev alloc (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).\n- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).\n- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).\n- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).\n- media: venus: hfi: avoid null dereference in deinit (git-fixes).\n- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).\n- media: videobuf2: Fix the size printk format (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- media: vidtv: Check for null return of vzalloc (git-fixes).\n- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).\n- mei: hbm: drop capability response on early shutdown (git-fixes).\n- mei: me: add Alder Lake N device id (git-fixes).\n- mei: me: add raptor lake point S DID (git-fixes).\n- mei: me: disable driver on the ign firmware (git-fixes).\n- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).\n- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).\n- memory: mtk-smi: Add error handle for smi_probe (git-fixes).\n- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).\n- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).\n- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).\n- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).\n- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).\n- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).\n- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).\n- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).\n- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).\n- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).\n- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).\n- misc: rtsx: set NULL intfdata when probe fails (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).\n- mlx5: kabi protect lag_mp (git-fixes).\n- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).\n- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)\n- mmc: block: Check for errors after write on SPI (git-fixes).\n- mmc: block: Fix CQE recovery reset success (git-fixes).\n- mmc: block: fix read single on recovery logic (git-fixes).\n- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).\n- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).\n- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).\n- mmc: core: Wait for command setting \u0027Power Off Notification\u0027 bit to complete (git-fixes).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- mm: Change CONFIG option for mm-\u003epasid field (jsc#SLE-24350).\n- mmc: host: Return an error when -\u003eenable_sdio_irq() ops is missing (git-fixes).\n- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).\n- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).\n- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).\n- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).\n- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).\n- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).\n- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).\n- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).\n- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).\n- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).\n- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).\n- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).\n- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).\n- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).\n- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).\n- mm/slub: add missing TID updates on slab deactivation (git-fixes).\n- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).\n- mm, thp: lock filemap when truncating page cache (bsc#1198023).\n- mm/vmalloc: fix comments about vmap_area struct (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- modpost: fix removing numeric suffixes (git-fixes).\n- modpost: fix section mismatch check for exported init/exit sections (git-fixes).\n- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).\n- modpost: restore the warning message for missing symbol versions (git-fixes).\n- mptcp: add missing documented NL params (git-fixes).\n- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).\n- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).\n- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).\n- mt76: fix encap offload ethernet type check (git-fixes).\n- mt76: fix monitor mode crash with sdio driver (git-fixes).\n- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).\n- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).\n- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).\n- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).\n- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7921: fix crash when startup fails (git-fixes).\n- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).\n- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).\n- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).\n- mtd: mchp23k256: Add SPI ID table (git-fixes).\n- mtd: mchp48l640: Add SPI ID table (git-fixes).\n- mtd: onenand: Check for error irq (git-fixes).\n- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).\n- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).\n- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).\n- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).\n- mtd: rawnand: denali: Use managed device resources (git-fixes).\n- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).\n- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).\n- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).\n- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).\n- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).\n- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).\n- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).\n- n64cart: convert bi_disk to bi_bdev-\u003ebd_disk fix build (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: atlantic: Avoid out-of-bounds indexing (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: axienet: setup mdio unconditionally (git-fixes).\n- net: bnxt_ptp: fix compilation error (bsc#1199736).\n- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).\n- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).\n- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).\n- net: dpaa_eth: remove dead select in menuconfig FSL_DPAA_ETH (git-fixes).\n- net: dsa: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: hellcreek: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: microchip: ksz8863: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: xrs700x: be compatible with masters which unregister on shutdown (git-fixes).\n- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).\n- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).\n- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).\n- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).\n- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).\n- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).\n- net: hns3: add return value for mailbox handling in PF (bsc#1190336).\n- net: hns3: add validity check for message data length (git-fixes).\n- net: hns3: add vlan list lock to protect vlan list (git-fixes).\n- net: hns3: align the debugfs output to the left (git-fixes).\n- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).\n- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).\n- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).\n- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).\n- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).\n- net: hns3: handle empty unknown interrupt for VF (git-fixes).\n- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).\n- net: hns3: refine the process when PF set VF VLAN (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).\n- net/ice: Fix boolean assignment (bsc#1200502).\n- net/ice: Remove unused enum (bsc#1200502).\n- net: ipa: disable HOLB drop when updating timer (git-fixes).\n- net: ipa: HOLB register sometimes must be written twice (git-fixes).\n- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).\n- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).\n- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).\n- net: marvell: prestera: fix double free issue on err path (git-fixes).\n- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).\n- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).\n- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).\n- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).\n- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).\n- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).\n- net/mlx5: DR, Cache STE shadow memory (git-fixes).\n- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).\n- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).\n- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).\n- net/mlx5e: Add missing increment of count (jsc#SLE-19253).\n- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).\n- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).\n- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).\n- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).\n- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).\n- net/mlx5e: Fix module EEPROM query (git-fixes).\n- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).\n- net/mlx5e: Fix trust state reset in reload (git-fixes).\n- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).\n- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).\n- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).\n- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).\n- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).\n- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).\n- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).\n- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).\n- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).\n- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).\n- net/mlx5: Fix a race on command flush flow (git-fixes).\n- net/mlx5: Fix deadlock in sync reset flow (git-fixes).\n- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).\n- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).\n- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).\n- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).\n- net: mvmdio: fix compilation warning (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: correct spelling error of media in documentation (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).\n- net: phy: Fix race condition on link status change (git-fixes).\n- net: phy: marvell10g: fix return value on error (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).\n- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).\n- net: phy: meson-gxl: improve link-up behavior (git-fixes).\n- net: phy: micrel: Allow probing without .driver_data (git-fixes).\n- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).\n- net: phy: micrel: Pass .probe for KS8737 (git-fixes).\n- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).\n- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).\n- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: sfc: add missing xdp queue reinitialization (git-fixes).\n- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).\n- net: sfc: fix memory leak due to ptp channel (git-fixes).\n- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).\n- net/smc: Avoid warning of possible recursive locking (git-fixes).\n- net/smc: fix connection leak (git-fixes).\n- net/smc: fixes for converting from \u0027struct smc_cdc_tx_pend **\u0027 to \u0027struct smc_wr_tx_pend_priv *\u0027 (git-fixes).\n- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).\n- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).\n- net/smc: postpone sk_refcnt increment in connect() (git-fixes).\n- net/smc: remove redundant re-assignment of pointer link (git-fixes).\n- net/smc: Remove unused function declaration (git-fixes).\n- net/smc: Reset conn-\u003elgr when link group registration fails (git-fixes).\n- net/smc: set ini-\u003esmcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).\n- net/smc: sync err code when tcp connection was refused (git-fixes).\n- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).\n- net/smc: Transitional solution for clcsock race issue (git-fixes).\n- net/smc: Use a mutex for locking \u0027struct smc_pnettable\u0027 (git-fixes).\n- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).\n- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).\n- net: stmmac: Fix signed/unsigned wreckage (git-fixes).\n- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).\n- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: asix: do not force pause frames support (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).\n- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).\n- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).\n- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).\n- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).\n- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).\n- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).\n- nfc: NULL out the dev-\u003erfkill to prevent UAF (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- nfc: pn533: Fix buggy cleanup order (git-fixes).\n- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).\n- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nfp: flower: fix ida_idx not being released (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).\n- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- NFSD: Fix a write performance regression (bsc#1197016).\n- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).\n- NFSD: Fix nsfd startup race (again) (git-fixes).\n- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).\n- NFSD: Fix READDIR buffer overflow (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSD: Fix verifier returned in stable WRITEs (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).\n- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not overfill uncached readdir pages (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report ENOSPC write errors twice (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: do not store \u0027struct cred *\u0027 in struct nfs_access_entry (git-fixes).\n- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).\n- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFS: fix broken handling of the softreval mount option (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).\n- NFS: pass cred explicitly for access tests (git-fixes).\n- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).\n- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- nl80211: show SSID for P2P_GO interfaces (git-fixes).\n- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).\n- nl80211: validate S1G channel width (git-fixes).\n- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).\n- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).\n- nvme: add verbose error logging (bsc#1200567). Update config files.\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme: send uevent on connection up (jsc#SLE-23643).\n- objtool: Add frame-pointer-specific function ignore (bsc#1193277).\n- objtool: Fix code relocs vs weak symbols (git-fixes).\n- objtool: Fix type of reloc::addend (git-fixes).\n- objtool: Ignore unwind hints for ignored functions (bsc#1193277).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- octeontx2-af: Add a \u0027rvu_free_bitmap()\u0027 function (gix-fixes).\n- octeontx2-af: Fix some memory leaks in the error handling path of \u0027cgx_lmac_init()\u0027 (git-fixes).\n- of: base: Fix phandle argument length mismatch error message (git-fixes).\n- of: base: Improve argument length mismatch error (git-fixes).\n- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).\n- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).\n- of: Support more than one crash kernel regions for kexec -s (git-fixes).\n- of: unittest: 64 bit dma address test requires arch support (git-fixes).\n- of: unittest: fix warning on PowerPC frame size warning (git-fixes).\n- of: unittest: update text of expected warnings (git-fixes).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).\n- PCI: aardvark: Add support for PME interrupts (git-fixes).\n- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).\n- PCI: aardvark: Clear all MSIs at setup (git-fixes).\n- PCI: aardvark: Comment actions in driver remove method (git-fixes).\n- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).\n- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).\n- PCI: aardvark: Disable link training when unbinding driver (git-fixes).\n- PCI: aardvark: Do not mask irq when mapping (git-fixes).\n- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).\n- PCI: aardvark: Enable MSI-X support (git-fixes).\n- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).\n- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).\n- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).\n- PCI: aardvark: Fix setting MSI address (git-fixes).\n- PCI: aardvark: Fix support for MSI interrupts (git-fixes).\n- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).\n- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).\n- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).\n- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).\n- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).\n- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).\n- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).\n- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).\n- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).\n- PCI: aardvark: Update comment about link going down after link-up (git-fixes).\n- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev-\u003eof_node) (git-fixes).\n- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).\n- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).\n- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).\n- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).\n- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).\n- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).\n- PCI: endpoint: Fix misused goto label (git-fixes).\n- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).\n- PCI: imx6: Fix PERST# start-up sequence (git-fixes).\n- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).\n- PCI: microchip: Fix potential race in interrupt handling (git-fixes).\n- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).\n- PCI: mvebu: Fix device enumeration regression (git-fixes).\n- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).\n- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).\n- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).\n- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).\n- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).\n- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).\n- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).\n- PCI/PM: Power up all devices during runtime resume (git-fixes).\n- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).\n- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).\n- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).\n- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).\n- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).\n- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).\n- perf: Copy perf_event_attr::sig_data on modification (git fixes).\n- perf/core: Do not pass task around when ctx sched in (git-fixes).\n- perf/core: Fix address filter parser for multiple filters (git fixes).\n- perf/core: Fix cgroup event list management (git fixes).\n- perf/core: Fix perf_cgroup_switch() (git fixes).\n- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).\n- perf: Fix list corruption in perf_cgroup_switch() (git fixes).\n- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).\n- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).\n- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).\n- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).\n- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).\n- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).\n- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).\n- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).\n- phy: dphy: Correct clk_pre parameter (git-fixes).\n- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).\n- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).\n- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).\n- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).\n- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).\n- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).\n- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).\n- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).\n- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).\n- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).\n- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).\n- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).\n- phy: usb: Leave some clocks running during suspend (git-fixes).\n- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).\n- pinctrl: bcm2835: Fix a few error paths (git-fixes).\n- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).\n- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- pinctrl: k210: Fix bias-pull-up (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: moore: Fix build error (git-fixes).\n- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).\n- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).\n- pinctrl: mediatek: paris: Fix \u0027argument\u0027 argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).\n- pinctrl: microchip-sgpio: lock RMW access (git-fixes).\n- pinctrl: microchip sgpio: use reset driver (git-fixes).\n- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: npcm: Fix broken references to chip-\u003eparent_device (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).\n- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).\n- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).\n- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).\n- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).\n- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).\n- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).\n- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).\n- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).\n- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).\n- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).\n- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).\n- pinctrl: tigerlake: Revert \u0027Add Alder Lake-M ACPI ID\u0027 (git-fixes).\n- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).\n- ping: remove pr_err from ping_lookup (bsc#1195826).\n- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).\n- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).\n- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).\n- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).\n- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).\n- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).\n- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).\n- platform/surface: surface3-wmi: Simplify resource management (git-fixes).\n- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).\n- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).\n- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).\n- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).\n- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).\n- platform/x86: asus-wmi: Fix \u0027unsigned \u0027retval\u0027 is never less than zero\u0027 smatch warning (bsc#1198058).\n- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).\n- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).\n- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).\n- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).\n- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).\n- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).\n- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).\n- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).\n- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).\n- platform/x86: panasonic-laptop: revert \u0027Resolve hotkey double trigger bug\u0027 (git-fixes).\n- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).\n- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).\n- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).\n- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).\n- PM: domains: Fix initialization of genpd\u0027s next_wakeup (git-fixes).\n- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).\n- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).\n- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).\n- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/lib/sstep: Fix \u0027sthcx\u0027 instruction (bsc#1156395).\n- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).\n- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).\n- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).\n- powerpc/xive: Add some error handling code to \u0027xive_spapr_init()\u0027 (git-fixes).\n- powerpc/xive: Change the debugfs file \u0027xive\u0027 into a directory (bsc#1194409 ltc#195810).\n- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).\n- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).\n- powerpc/xive: Rename the \u0027cpus\u0027 debugfs file to \u0027ipis\u0027 (bsc#1194409 ltc#195810).\n- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).\n- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).\n- power: supply: axp20x_battery: properly report current when discharging (git-fixes).\n- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).\n- power: supply: axp288_fuel_gauge: Drop BIOS version check from \u0027T3 MRD\u0027 DMI quirk (git-fixes).\n- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).\n- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).\n- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).\n- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).\n- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).\n- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- proc: bootconfig: Add null pointer check (git-fixes).\n- proc: fix documentation and description of pagemap (git-fixes).\n- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).\n- psi: fix \u0027defined but not used\u0027 warnings when (git-fixes)\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- pvpanic: Fix typos in the comments (git-fixes).\n- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).\n- qed: display VF trust config (git-fixes).\n- qede: confirm skb is allocated before using (git-fixes).\n- qed: fix ethtool register dump (jsc#SLE-19001).\n- qed: return status of qed_iov_get_link (git-fixes).\n- qla2xxx: add -\u003emap_queues support for nvme (bsc#1195823).\n- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).\n- raid5: introduce MD_BROKEN (git-fixes).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: wake up /dev/random writers after zap (git-fixes).\n- random: wire up fops-\u003esplice_{read,write}_iter() (git-fixes).\n- ray_cs: Check ioremap return value (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (git-fixes).\n- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).\n- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).\n- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/irdma: Fix netdev notifications for vlan\u0027s (git-fixes).\n- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).\n- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).\n- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).\n- RDMA/irdma: Prevent some integer underflows (git-fixes).\n- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).\n- RDMA/irdma: Remove incorrect masking of PD (git-fixes).\n- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/mlx5: Add a missing update of cache-\u003elast_add (git-fixes).\n- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).\n- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).\n- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).\n- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).\n- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).\n- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).\n- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).\n- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).\n- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).\n- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).\n- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).\n- regmap-irq: Update interrupt clear register for proper reset (git-fixes).\n- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).\n- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).\n- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).\n- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).\n- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).\n- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).\n- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).\n- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).\n- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).\n- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).\n- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).\n- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).\n- Revert \u0027drm/amd/display: Fix DCN3 B0 DP Alt Mapping\u0027 (git-fixes).\n- Revert \u0027drm/amdgpu/display: set vblank_disable_immediate for DC\u0027 (git-fixes).\n- Revert \u0027svm: Add warning message for AVIC IPI invalid target\u0027 (git-fixes).\n- rfkill: make new event layout opt-in (git-fixes).\n- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).\n- riscv: Fix fill_callchain return value (git fixes).\n- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).\n- rpmsg: qcom_smd: Fix redundant channel-\u003eregistered assignment (git-fixes).\n- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).\n- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).\n- rtc: check if __rtc_read_time was successful (git-fixes).\n- rtc: fix use-after-free on device removal (git-fixes).\n- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).\n- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).\n- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).\n- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).\n- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).\n- rtc: mxc: Silence a clang warning (git-fixes).\n- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).\n- rtc: pl031: fix rtc features null pointer dereference (git-fixes).\n- rtc: sun6i: Fix time overflow handling (git-fixes).\n- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- rtl818x: Prevent using not initialized queues (git-fixes).\n- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).\n- rtw88: 8821c: fix debugfs rssi value (git-fixes).\n- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).\n- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).\n- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390/dasd: fix data corruption for ESE devices (git-fixes).\n- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).\n- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).\n- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).\n- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).\n- s390/extable: fix exception table sorting (git-fixes).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).\n- s390/setup: avoid reserving memory above identity mapping (git-fixes).\n- s390/smp: sort out physical vs virtual pointers usage (git-fixes).\n- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).\n- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).\n- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).\n- sched/core: Export pelt_thermal_tp (git-fixes)\n- sched/core: Fix forceidle balancing (git-fixes)\n- sched/core: Mitigate race (git-fixes)\n- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)\n- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).\n- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).\n- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).\n- sched/fair: Revise comment about lb decision matrix (git-fixes)\n- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)\n- sched: Fix yet more sched_fork() races (git fixes (sched/core)).\n- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)\n- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).\n- sched/numa: Apply imbalance limitations consistently (bnc#1193431).\n- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).\n- sched/numa: Initialise numa_migrate_retry (bnc#1193431).\n- sched/pasid: Add a kABI workaround (jsc#SLE-24350).\n- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)\n- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)\n- sched/psi: report zeroes for CPU full at the system level (git-fixes)\n- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)\n- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)\n- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)\n- sched/sugov: Ignore \u0027busy\u0027 filter when rq is capped by (git-fixes)\n- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)\n- scripts/faddr2line: Fix overlapping text section failures (git-fixes).\n- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).\n- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).\n- scsi: core: Query VPD size before getting full page (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).\n- scsi: hisi_sas: Fix some issues related to asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).\n- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).\n- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).\n- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).\n- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: iscsi: Add helper functions to manage iscsi_cls_conn (bsc#1198410).\n- scsi: iscsi: Add helper to remove a session from the kernel (bsc#1198410).\n- scsi: iscsi: Allow iscsi_if_stop_conn() to be called from kernel (bsc#1198410).\n- scsi: iscsi: Clean up bound endpoints during shutdown (bsc#1198410).\n- scsi: iscsi: Fix HW conn removal use after free (bsc#1198410).\n- scsi: iscsi: Fix session removal on shutdown (bsc#1198410).\n- scsi: libiscsi: Teardown iscsi_cls_conn gracefully (bsc#1198410).\n- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).\n- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).\n- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).\n- scsi: libsas: Keep host active while processing events (bsc#1198802).\n- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).\n- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).\n- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).\n- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).\n- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).\n- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).\n- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).\n- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).\n- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).\n- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).\n- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).\n- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).\n- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).\n- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).\n- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).\n- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).\n- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).\n- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).\n- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).\n- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).\n- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).\n- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).\n- scsi: lpfc: Remove unneeded variable (bsc#1200045).\n- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).\n- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).\n- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).\n- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).\n- scsi: lpfc: Zero SLI4 fcp_cmnd buffer\u0027s fcpCntl0 field (bsc#1200045).\n- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).\n- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).\n- scsi: mpt3sas: Page fault in reply q processing (git-fixes).\n- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).\n- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).\n- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).\n- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).\n- scsi: qedi: Use QEDI_MODE_NORMAL for error handling (bsc#1198410).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- selftest: KVM: Add open sev dev helper (bsc#1194526).\n- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).\n- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).\n- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).\n- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).\n- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).\n- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).\n- selftests: kvm: Remove absent target file (git-fixes).\n- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).\n- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).\n- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).\n- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).\n- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).\n- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).\n- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).\n- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).\n- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).\n- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).\n- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).\n- serial: imx: fix overrun interrupts in DMA mode (git-fixes).\n- serial: meson: acquire port-\u003elock in startup() (git-fixes).\n- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).\n- serial: pch: do not overwrite xmit-\u003ebuf[0] by x_char (git-fixes).\n- serial: rda-uart: Do not allow CS5-6 (git-fixes).\n- serial: samsung_tty: do not unlock port-\u003elock for uart_write_wakeup() (git-fixes).\n- serial: sh-sci: Do not allow CS5-6 (git-fixes).\n- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).\n- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).\n- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).\n- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).\n- serial: txx9: Do not allow CS5-6 (git-fixes).\n- sfc: Do not free an empty page_ring (git-fixes).\n- sfc: fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: Use swap() instead of open coding it (bsc#1196306).\n- sfc: use swap() to make code cleaner (bsc#1196306).\n- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).\n- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).\n- slip: fix macro redefine warning (git-fixes).\n- smb3: add mount parm nosparse (bsc#1193629).\n- smb3: add trace point for lease not found issue (bsc#1193629).\n- smb3: add trace point for oplock not found (bsc#1193629).\n- smb3: check for null tcon (bsc#1193629).\n- smb3: cleanup and clarify status of tree connections (bsc#1193629).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).\n- smb3: fix snapshot mount option (bsc#1193629).\n- smb3 improve error message when mount options conflict with posix (bsc#1193629).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).\n- smb3 move more common protocol header definitions to smbfs_common (bsc#1193629).\n- smb3: send NTLMSSP version information (bsc#1193629).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- smsc911x: allow using IRQ0 (git-fixes).\n- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).\n- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).\n- soc: qcom: aoss: Expose send for generic usecase (git-fixes).\n- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).\n- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).\n- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).\n- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).\n- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).\n- sound/oss/dmasound: fix \u0027dmasound_setup\u0027 defined but not used (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).\n- soundwire: qcom: adjust autoenumeration timeout (git-fixes).\n- speakup-dectlk: Restore pitch setting (git-fixes).\n- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).\n- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).\n- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).\n- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).\n- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).\n- spi: Fix erroneous sgs value with min_t() (git-fixes).\n- spi: Fix invalid sgs value (git-fixes).\n- spi: Fix Tegra QSPI example (git-fixes).\n- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).\n- spi: mxic: Fix the transmit path (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).\n- spi: rockchip: Fix error in getting num-cs property (git-fixes).\n- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).\n- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).\n- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).\n- spi: rockchip: terminate dma transmission when slave abort (git-fixes).\n- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).\n- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).\n- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).\n- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).\n- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).\n- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- spi: tegra20: Use of_device_get_match_data() (git-fixes).\n- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).\n- staging: most: dim2: use device release method (git-fixes).\n- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).\n- staging: mt7621-dts: fix formatting (git-fixes).\n- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).\n- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).\n- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).\n- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).\n- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).\n- staging: vc04_services: shut up out-of-range warning (git-fixes).\n- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).\n- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).\n- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).\n- staging: vchiq: Move vchiq char driver to its own file (git-fixes).\n- staging: vchiq: Refactor vchiq cdev code (git-fixes).\n- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).\n- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).\n- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).\n- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).\n- SUNRPC do not resend a task on an offlined transport (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).\n- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).\n- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).\n- SUNRPC: Trap RDMA segment overflows (git-fixes).\n- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).\n- supported.conf: add intel_sdsi\n- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)\n- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)\n- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).\n- swiotlb: max mapping size takes min align mask into account (bsc#1197303).\n- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).\n- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).\n- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).\n- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).\n- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).\n- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).\n- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).\n- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Fix attr.show callback prototype (git-fixes).\n- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).\n- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).\n- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)\n- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)\n- timers: Fix warning condition in __run_timers() (git-fixes)\n- TOMOYO: fix __setup handlers return values (git-fixes).\n- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).\n- tools: bpftool: Complete metrics list in \u0027bpftool prog profile\u0027 doc (git-fixes).\n- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).\n- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).\n- tpm: Fix error handling in async work (git-fixes).\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tpm: use try_get_ops() in tpm-space.c (git-fixes).\n- tps6598x: clear int mask on probe failure (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix potential double free in create_var_ref() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have trace event string test handle zero length strings (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histogram: Fix sorting on old \u0027cpu\u0027 value (git-fixes).\n- tracing/osnoise: Force quiescent states while tracing (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).\n- tty: Fix a possible resource leak in icom_probe (git-fixes).\n- tty: fix deadlock caused by calling printk() under tty_port-\u003elock (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).\n- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).\n- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).\n- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).\n- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).\n- tty: n_gsm: Fix packet data hex dump output (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).\n- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).\n- tty: n_tty: Restore EOF push handling behavior (git-fixes).\n- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).\n- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).\n- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).\n- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).\n- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).\n- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).\n- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).\n- udmabuf: validate ubuf-\u003epagecount (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).\n- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).\n- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).\n- usb: core: hcd: Add support for deferring roothub registration (git-fixes).\n- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: dwc2: gadget: do not reset gadget\u0027s driver-\u003ebus (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: Decouple USB 2.0 L1 \u0026 L2 events (git-fixes).\n- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).\n- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).\n- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).\n- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Return proper request status (git-fixes).\n- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).\n- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).\n- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).\n- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).\n- usb: dwc3: omap: fix \u0027unbalanced disables for smps10_out1\u0027 on omap5evm (git-fixes).\n- usb: dwc3: pci: Add \u0027snps,dis_u2_susphy_quirk\u0027 for Intel Bay Trail (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).\n- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).\n- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).\n- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).\n- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).\n- usb: ehci: add pci device support for Aspeed platforms (git-fixes).\n- usb: ehci-omap: drop unused ehci_read() function (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).\n- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).\n- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: gadget: f_fs: change ep-\u003eep safe in ffs_epfile_io() (git-fixes).\n- usb: gadget: f_fs: change ep-\u003estatus safe in ffs_epfile_io() (git-fixes).\n- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).\n- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).\n- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc-\u003edev.driver (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).\n- usb: gadget: tegra-xudc: Fix control endpoint\u0027s definitions (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).\n- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).\n- usb: gadget: uvc: rename function to be more consistent (git-fixes).\n- usb: gadget: validate endpoint index for xilinx udc (git-fixes).\n- usb: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).\n- USB: host: isp116x: check return value after calling platform_get_resource() (git-fixes).\n- usb: isp1760: Fix out-of-bounds array access (git-fixes).\n- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: new quirk for Dell Gen 2 devices (git-fixes).\n- usb: phy: generic: Get the vbus supply (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).\n- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- USB: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add support for DW5829e (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: serial: option: add Telit LE910R1 compositions (git-fixes).\n- usb: serial: option: add ZTE MF286D modem (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).\n- usb: serial: pl2303: fix GS type detection (git-fixes).\n- usb: serial: pl2303: fix type detection for odd device (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: simple: add Nokia phone driver (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- usb: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- usb: typec: mux: Check dev_set_name() return value (git-fixes).\n- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).\n- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).\n- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).\n- usb: typec: ucsi: Fix role swapping (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).\n- usb: zaurus: support another broken Zaurus (git-fixes).\n- use jobs not processors in the constraints jobs is the number of vcpus available to the build, while processors is the total processor count of the machine the VM is running on.\n- vdpasim: allow to enable a vq repeatedly (git-fixes).\n- veth: Ensure eth header is in skb\u0027s linear part (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).\n- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).\n- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).\n- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).\n- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)\n- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).\n- video: fbdev: w100fb: Reset global state (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- virtio_console: break out of buf poll on remove (git-fixes).\n- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio: fix virtio transitional ids (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix for skb_over_panic inside big mode (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-net: realign page_to_skb() after merges (git-fixes).\n- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vringh: Fix loop descriptors check in the indirect cases (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- vsprintf: Fix potential unaligned access (bsc#1198379).\n- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).\n- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).\n- vxcan: enable local echo for sent CAN frames (git-fixes).\n- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).\n- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).\n- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).\n- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).\n- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).\n- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).\n- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).\n- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).\n- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).\n- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).\n- watch_queue: Actually free the watch (git-fixes).\n- watch_queue: Fix NULL dereference in error cleanup (git-fixes).\n- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).\n- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).\n- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).\n- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).\n- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).\n- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).\n- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).\n- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).\n- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).\n- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).\n- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).\n- x86/entry: Remove skip_r11rcx (bsc#1201524).\n- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).\n- x86/ibt,xen: Sprinkle the ENDBR (bsc#1201471).\n- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).\n- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).\n- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).\n- x86/kvmclock: Fix Hyper-V Isolated VM s boot issue when vCPUs 64 (bsc#1183682).\n- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).\n- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).\n- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).\n- x86/module: Fix the paravirt vs alternative order (bsc#1190497).\n- x86/pm: Save the MSR validity status at context setup (bsc#1190497).\n- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).\n- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).\n- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).\n- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).\n- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).\n- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n- xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).\n- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).\n- xfs: drop async cache flushes from CIL commits (bsc#1195669).\n- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).\n- xhci: Enable runtime PM on second Alderlake controller (git-fixes).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).\n- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).\n- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).\n- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n- xhci: turn off port power in shutdown (git-fixes).\n- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).\n- zsmalloc: decouple class actions from zspage works (bsc#1189998).\n- zsmalloc: introduce obj_allocated (bsc#1189998).\n- zsmalloc: introduce some helper functions (bsc#1189998).\n- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).\n- zsmalloc: remove zspage isolation for migration (bsc#1189998).\n- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).\n- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).\n- zsmalloc: replace per zpage lock with poolmigrate_lock (bsc#1189998).\n- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2520,SUSE-SLE-Module-Basesystem-15-SP4-2022-2520,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2520,SUSE-SLE-Module-Legacy-15-SP4-2022-2520,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2520,SUSE-SLE-Product-HA-15-SP4-2022-2520,SUSE-SLE-Product-WE-15-SP4-2022-2520,openSUSE-SLE-15.4-2022-2520", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2520-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2520-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222520-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2520-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1103269", "url": "https://bugzilla.suse.com/1103269" }, { "category": "self", "summary": "SUSE Bug 1118212", "url": "https://bugzilla.suse.com/1118212" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1179439", "url": "https://bugzilla.suse.com/1179439" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1183682", "url": "https://bugzilla.suse.com/1183682" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1184318", "url": "https://bugzilla.suse.com/1184318" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188885", "url": "https://bugzilla.suse.com/1188885" }, { "category": "self", "summary": "SUSE Bug 1189998", "url": "https://bugzilla.suse.com/1189998" }, { "category": "self", "summary": "SUSE Bug 1190137", "url": "https://bugzilla.suse.com/1190137" }, { "category": "self", "summary": "SUSE Bug 1190208", "url": "https://bugzilla.suse.com/1190208" }, { "category": "self", "summary": "SUSE Bug 1190336", "url": "https://bugzilla.suse.com/1190336" }, { "category": "self", "summary": "SUSE Bug 1190497", "url": "https://bugzilla.suse.com/1190497" }, { "category": "self", "summary": "SUSE Bug 1190768", "url": "https://bugzilla.suse.com/1190768" }, { "category": "self", "summary": "SUSE Bug 1190786", "url": "https://bugzilla.suse.com/1190786" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191663", "url": "https://bugzilla.suse.com/1191663" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193064", "url": "https://bugzilla.suse.com/1193064" }, { "category": "self", "summary": "SUSE Bug 1193277", "url": "https://bugzilla.suse.com/1193277" }, { "category": "self", "summary": "SUSE Bug 1193289", "url": "https://bugzilla.suse.com/1193289" }, { "category": "self", "summary": "SUSE Bug 1193431", "url": "https://bugzilla.suse.com/1193431" }, { "category": "self", "summary": "SUSE Bug 1193556", "url": "https://bugzilla.suse.com/1193556" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1193640", "url": "https://bugzilla.suse.com/1193640" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1193823", "url": "https://bugzilla.suse.com/1193823" }, { "category": "self", "summary": "SUSE Bug 1193852", "url": "https://bugzilla.suse.com/1193852" }, { "category": "self", "summary": "SUSE Bug 1194086", "url": "https://bugzilla.suse.com/1194086" }, { "category": "self", "summary": "SUSE Bug 1194111", "url": "https://bugzilla.suse.com/1194111" }, { "category": "self", "summary": "SUSE Bug 1194191", "url": "https://bugzilla.suse.com/1194191" }, { "category": "self", "summary": "SUSE Bug 1194409", "url": "https://bugzilla.suse.com/1194409" }, { "category": "self", "summary": "SUSE Bug 1194501", "url": "https://bugzilla.suse.com/1194501" }, { "category": "self", "summary": "SUSE Bug 1194523", "url": "https://bugzilla.suse.com/1194523" }, { "category": "self", "summary": "SUSE Bug 1194526", "url": "https://bugzilla.suse.com/1194526" }, { "category": "self", "summary": "SUSE Bug 1194583", "url": "https://bugzilla.suse.com/1194583" }, { "category": "self", "summary": "SUSE Bug 1194585", "url": "https://bugzilla.suse.com/1194585" }, { "category": "self", "summary": "SUSE Bug 1194586", "url": "https://bugzilla.suse.com/1194586" }, { "category": "self", "summary": "SUSE Bug 1194625", "url": "https://bugzilla.suse.com/1194625" }, { "category": "self", "summary": "SUSE Bug 1194765", "url": "https://bugzilla.suse.com/1194765" }, { "category": "self", "summary": "SUSE Bug 1194826", "url": "https://bugzilla.suse.com/1194826" }, { "category": "self", "summary": "SUSE Bug 1194869", "url": "https://bugzilla.suse.com/1194869" }, { "category": "self", "summary": "SUSE Bug 1195099", "url": "https://bugzilla.suse.com/1195099" }, { "category": "self", "summary": "SUSE Bug 1195287", "url": "https://bugzilla.suse.com/1195287" }, { "category": "self", "summary": "SUSE Bug 1195478", "url": "https://bugzilla.suse.com/1195478" }, { "category": "self", "summary": "SUSE Bug 1195482", "url": "https://bugzilla.suse.com/1195482" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195651", "url": "https://bugzilla.suse.com/1195651" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195669", "url": "https://bugzilla.suse.com/1195669" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195826", "url": "https://bugzilla.suse.com/1195826" }, { "category": "self", "summary": "SUSE Bug 1195913", "url": "https://bugzilla.suse.com/1195913" }, { "category": "self", "summary": "SUSE Bug 1195915", "url": "https://bugzilla.suse.com/1195915" }, { "category": "self", "summary": "SUSE Bug 1195926", "url": "https://bugzilla.suse.com/1195926" }, { "category": "self", "summary": "SUSE Bug 1195944", "url": "https://bugzilla.suse.com/1195944" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196114", "url": "https://bugzilla.suse.com/1196114" }, { "category": "self", "summary": "SUSE Bug 1196130", "url": "https://bugzilla.suse.com/1196130" }, { "category": "self", "summary": "SUSE Bug 1196213", "url": "https://bugzilla.suse.com/1196213" }, { "category": "self", "summary": "SUSE Bug 1196306", "url": "https://bugzilla.suse.com/1196306" }, { "category": "self", "summary": "SUSE Bug 1196367", "url": "https://bugzilla.suse.com/1196367" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196426", "url": "https://bugzilla.suse.com/1196426" }, { "category": "self", "summary": "SUSE Bug 1196478", "url": "https://bugzilla.suse.com/1196478" }, { "category": "self", "summary": "SUSE Bug 1196514", "url": "https://bugzilla.suse.com/1196514" }, { "category": "self", "summary": "SUSE Bug 1196570", "url": "https://bugzilla.suse.com/1196570" }, { "category": "self", "summary": "SUSE Bug 1196723", "url": "https://bugzilla.suse.com/1196723" }, { "category": "self", "summary": "SUSE Bug 1196779", "url": "https://bugzilla.suse.com/1196779" }, { "category": "self", "summary": "SUSE Bug 1196830", "url": "https://bugzilla.suse.com/1196830" }, { "category": "self", "summary": "SUSE Bug 1196836", "url": "https://bugzilla.suse.com/1196836" }, { "category": "self", "summary": "SUSE Bug 1196866", "url": "https://bugzilla.suse.com/1196866" }, { "category": "self", "summary": "SUSE Bug 1196868", "url": "https://bugzilla.suse.com/1196868" }, { "category": "self", "summary": "SUSE Bug 1196869", "url": "https://bugzilla.suse.com/1196869" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1196930", "url": "https://bugzilla.suse.com/1196930" }, { "category": "self", "summary": "SUSE Bug 1196942", "url": "https://bugzilla.suse.com/1196942" }, { "category": "self", "summary": "SUSE Bug 1196960", "url": "https://bugzilla.suse.com/1196960" }, { "category": "self", "summary": "SUSE Bug 1197016", "url": "https://bugzilla.suse.com/1197016" }, { "category": "self", "summary": "SUSE Bug 1197157", "url": "https://bugzilla.suse.com/1197157" }, { "category": "self", "summary": "SUSE Bug 1197227", "url": "https://bugzilla.suse.com/1197227" }, { "category": "self", "summary": "SUSE Bug 1197243", "url": "https://bugzilla.suse.com/1197243" }, { "category": "self", "summary": "SUSE Bug 1197292", "url": "https://bugzilla.suse.com/1197292" }, { "category": "self", "summary": "SUSE Bug 1197302", "url": "https://bugzilla.suse.com/1197302" }, { "category": "self", "summary": "SUSE Bug 1197303", "url": "https://bugzilla.suse.com/1197303" }, { "category": "self", "summary": "SUSE Bug 1197304", "url": "https://bugzilla.suse.com/1197304" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197386", "url": "https://bugzilla.suse.com/1197386" }, { "category": "self", "summary": "SUSE Bug 1197501", "url": "https://bugzilla.suse.com/1197501" }, { "category": "self", "summary": "SUSE Bug 1197601", "url": "https://bugzilla.suse.com/1197601" }, { "category": "self", "summary": "SUSE Bug 1197661", "url": "https://bugzilla.suse.com/1197661" }, { "category": "self", "summary": "SUSE Bug 1197675", "url": "https://bugzilla.suse.com/1197675" }, { "category": "self", "summary": "SUSE Bug 1197761", "url": "https://bugzilla.suse.com/1197761" }, { "category": "self", "summary": "SUSE Bug 1197817", "url": "https://bugzilla.suse.com/1197817" }, { "category": "self", "summary": "SUSE Bug 1197819", "url": "https://bugzilla.suse.com/1197819" }, { "category": "self", "summary": "SUSE Bug 1197820", "url": "https://bugzilla.suse.com/1197820" }, { "category": "self", "summary": "SUSE Bug 1197888", "url": "https://bugzilla.suse.com/1197888" }, { "category": "self", "summary": "SUSE Bug 1197889", "url": "https://bugzilla.suse.com/1197889" }, { "category": "self", "summary": "SUSE Bug 1197894", "url": "https://bugzilla.suse.com/1197894" }, { "category": "self", "summary": "SUSE Bug 1197915", "url": "https://bugzilla.suse.com/1197915" }, { "category": "self", "summary": "SUSE Bug 1197917", "url": "https://bugzilla.suse.com/1197917" }, { "category": "self", "summary": "SUSE Bug 1197918", "url": "https://bugzilla.suse.com/1197918" }, { "category": "self", "summary": "SUSE Bug 1197920", "url": "https://bugzilla.suse.com/1197920" }, { "category": "self", "summary": "SUSE Bug 1197921", "url": "https://bugzilla.suse.com/1197921" }, { "category": "self", "summary": "SUSE Bug 1197922", "url": "https://bugzilla.suse.com/1197922" }, { "category": "self", "summary": "SUSE Bug 1197926", "url": "https://bugzilla.suse.com/1197926" }, { "category": "self", "summary": "SUSE Bug 1198009", "url": "https://bugzilla.suse.com/1198009" }, { "category": "self", "summary": "SUSE Bug 1198010", "url": "https://bugzilla.suse.com/1198010" }, { "category": "self", "summary": "SUSE Bug 1198012", "url": "https://bugzilla.suse.com/1198012" }, { "category": "self", "summary": "SUSE Bug 1198013", "url": "https://bugzilla.suse.com/1198013" }, { "category": "self", "summary": "SUSE Bug 1198014", "url": "https://bugzilla.suse.com/1198014" }, { "category": "self", "summary": "SUSE Bug 1198015", "url": "https://bugzilla.suse.com/1198015" }, { "category": "self", "summary": "SUSE Bug 1198016", "url": "https://bugzilla.suse.com/1198016" }, { "category": "self", "summary": "SUSE Bug 1198017", "url": "https://bugzilla.suse.com/1198017" }, { "category": "self", "summary": "SUSE Bug 1198018", "url": "https://bugzilla.suse.com/1198018" }, { "category": "self", "summary": "SUSE Bug 1198019", "url": "https://bugzilla.suse.com/1198019" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198021", "url": "https://bugzilla.suse.com/1198021" }, { "category": "self", "summary": "SUSE Bug 1198022", "url": "https://bugzilla.suse.com/1198022" }, { "category": "self", "summary": "SUSE Bug 1198023", "url": "https://bugzilla.suse.com/1198023" }, { "category": "self", "summary": "SUSE Bug 1198024", "url": "https://bugzilla.suse.com/1198024" }, { "category": "self", "summary": "SUSE Bug 1198027", "url": "https://bugzilla.suse.com/1198027" }, { "category": "self", "summary": "SUSE Bug 1198030", "url": "https://bugzilla.suse.com/1198030" }, { "category": "self", "summary": "SUSE Bug 1198034", "url": "https://bugzilla.suse.com/1198034" }, { "category": "self", "summary": "SUSE Bug 1198058", "url": "https://bugzilla.suse.com/1198058" }, { "category": "self", "summary": "SUSE Bug 1198217", "url": "https://bugzilla.suse.com/1198217" }, { "category": "self", "summary": "SUSE Bug 1198379", "url": "https://bugzilla.suse.com/1198379" }, { "category": "self", "summary": "SUSE Bug 1198400", "url": "https://bugzilla.suse.com/1198400" }, { "category": "self", "summary": "SUSE Bug 1198402", "url": "https://bugzilla.suse.com/1198402" }, { "category": "self", "summary": "SUSE Bug 1198410", "url": "https://bugzilla.suse.com/1198410" }, { "category": "self", "summary": "SUSE Bug 1198412", "url": "https://bugzilla.suse.com/1198412" }, { "category": "self", "summary": "SUSE Bug 1198413", "url": "https://bugzilla.suse.com/1198413" }, { "category": "self", "summary": "SUSE Bug 1198438", "url": "https://bugzilla.suse.com/1198438" }, { "category": "self", "summary": "SUSE Bug 1198484", "url": "https://bugzilla.suse.com/1198484" }, { "category": "self", "summary": "SUSE Bug 1198577", "url": "https://bugzilla.suse.com/1198577" }, { "category": "self", "summary": "SUSE Bug 1198585", "url": "https://bugzilla.suse.com/1198585" }, { "category": "self", "summary": "SUSE Bug 1198660", "url": "https://bugzilla.suse.com/1198660" }, { "category": "self", "summary": "SUSE Bug 1198802", "url": "https://bugzilla.suse.com/1198802" }, { "category": "self", "summary": "SUSE Bug 1198803", "url": "https://bugzilla.suse.com/1198803" }, { "category": "self", "summary": "SUSE Bug 1198806", "url": "https://bugzilla.suse.com/1198806" }, { "category": "self", "summary": "SUSE Bug 1198811", "url": "https://bugzilla.suse.com/1198811" }, { "category": "self", "summary": "SUSE Bug 1198826", "url": "https://bugzilla.suse.com/1198826" }, { "category": "self", "summary": "SUSE Bug 1198829", "url": "https://bugzilla.suse.com/1198829" }, { "category": "self", "summary": "SUSE Bug 1198835", "url": "https://bugzilla.suse.com/1198835" }, { "category": "self", "summary": "SUSE Bug 1198968", "url": "https://bugzilla.suse.com/1198968" }, { "category": "self", "summary": "SUSE Bug 1198971", "url": "https://bugzilla.suse.com/1198971" }, { "category": "self", "summary": "SUSE Bug 1199011", "url": "https://bugzilla.suse.com/1199011" }, { "category": "self", "summary": "SUSE Bug 1199024", "url": "https://bugzilla.suse.com/1199024" }, { "category": "self", "summary": "SUSE Bug 1199035", "url": "https://bugzilla.suse.com/1199035" }, { "category": "self", "summary": "SUSE Bug 1199046", "url": "https://bugzilla.suse.com/1199046" }, { "category": "self", "summary": "SUSE Bug 1199052", "url": "https://bugzilla.suse.com/1199052" }, { "category": "self", "summary": "SUSE Bug 1199063", "url": "https://bugzilla.suse.com/1199063" }, { "category": "self", "summary": "SUSE Bug 1199163", "url": "https://bugzilla.suse.com/1199163" }, { "category": "self", "summary": "SUSE Bug 1199173", "url": "https://bugzilla.suse.com/1199173" }, { "category": "self", "summary": "SUSE Bug 1199260", "url": "https://bugzilla.suse.com/1199260" }, { "category": "self", "summary": "SUSE Bug 1199314", "url": "https://bugzilla.suse.com/1199314" }, { "category": "self", "summary": "SUSE Bug 1199390", "url": "https://bugzilla.suse.com/1199390" }, { "category": "self", "summary": "SUSE Bug 1199426", "url": "https://bugzilla.suse.com/1199426" }, { "category": "self", "summary": "SUSE Bug 1199433", "url": "https://bugzilla.suse.com/1199433" }, { "category": "self", "summary": "SUSE Bug 1199439", "url": "https://bugzilla.suse.com/1199439" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199505", "url": "https://bugzilla.suse.com/1199505" }, { "category": "self", "summary": "SUSE Bug 1199507", "url": "https://bugzilla.suse.com/1199507" }, { "category": "self", "summary": "SUSE Bug 1199605", "url": "https://bugzilla.suse.com/1199605" }, { "category": "self", "summary": "SUSE Bug 1199611", "url": "https://bugzilla.suse.com/1199611" }, { "category": "self", "summary": "SUSE Bug 1199626", "url": "https://bugzilla.suse.com/1199626" }, { "category": "self", "summary": "SUSE Bug 1199631", "url": "https://bugzilla.suse.com/1199631" }, { "category": "self", "summary": "SUSE Bug 1199650", "url": "https://bugzilla.suse.com/1199650" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1199674", "url": "https://bugzilla.suse.com/1199674" }, { "category": "self", "summary": "SUSE Bug 1199736", "url": "https://bugzilla.suse.com/1199736" }, { "category": "self", "summary": "SUSE Bug 1199793", "url": "https://bugzilla.suse.com/1199793" }, { "category": "self", "summary": "SUSE Bug 1199839", "url": "https://bugzilla.suse.com/1199839" }, { "category": "self", "summary": "SUSE Bug 1199875", "url": "https://bugzilla.suse.com/1199875" }, { "category": "self", "summary": "SUSE Bug 1199909", "url": "https://bugzilla.suse.com/1199909" }, { "category": "self", "summary": "SUSE Bug 1200015", "url": "https://bugzilla.suse.com/1200015" }, { "category": "self", "summary": "SUSE Bug 1200019", "url": "https://bugzilla.suse.com/1200019" }, { "category": "self", "summary": "SUSE Bug 1200045", "url": "https://bugzilla.suse.com/1200045" }, { "category": "self", "summary": "SUSE Bug 1200046", "url": "https://bugzilla.suse.com/1200046" }, { "category": "self", "summary": "SUSE Bug 1200144", "url": "https://bugzilla.suse.com/1200144" }, { "category": "self", "summary": "SUSE Bug 1200205", "url": "https://bugzilla.suse.com/1200205" }, { "category": "self", "summary": "SUSE Bug 1200211", "url": "https://bugzilla.suse.com/1200211" }, { "category": "self", "summary": "SUSE Bug 1200259", "url": "https://bugzilla.suse.com/1200259" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200284", "url": "https://bugzilla.suse.com/1200284" }, { "category": "self", "summary": "SUSE Bug 1200315", "url": "https://bugzilla.suse.com/1200315" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200420", "url": "https://bugzilla.suse.com/1200420" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200475", "url": "https://bugzilla.suse.com/1200475" }, { "category": "self", "summary": "SUSE Bug 1200502", "url": "https://bugzilla.suse.com/1200502" }, { "category": "self", "summary": "SUSE Bug 1200567", "url": "https://bugzilla.suse.com/1200567" }, { "category": "self", "summary": "SUSE Bug 1200569", "url": "https://bugzilla.suse.com/1200569" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200611", "url": "https://bugzilla.suse.com/1200611" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200762", "url": "https://bugzilla.suse.com/1200762" }, { "category": "self", "summary": "SUSE Bug 1200763", "url": "https://bugzilla.suse.com/1200763" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200808", "url": "https://bugzilla.suse.com/1200808" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200812", "url": "https://bugzilla.suse.com/1200812" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200815", "url": "https://bugzilla.suse.com/1200815" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200824", "url": "https://bugzilla.suse.com/1200824" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200827", "url": "https://bugzilla.suse.com/1200827" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200830", "url": "https://bugzilla.suse.com/1200830" }, { "category": "self", "summary": "SUSE Bug 1200845", "url": "https://bugzilla.suse.com/1200845" }, { "category": "self", "summary": "SUSE Bug 1200882", "url": "https://bugzilla.suse.com/1200882" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201196", "url": "https://bugzilla.suse.com/1201196" }, { "category": "self", "summary": "SUSE Bug 1201218", "url": "https://bugzilla.suse.com/1201218" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201228", "url": "https://bugzilla.suse.com/1201228" }, { "category": "self", "summary": "SUSE Bug 1201251", "url": "https://bugzilla.suse.com/1201251" }, { "category": "self", "summary": "SUSE Bug 1201381", "url": "https://bugzilla.suse.com/1201381" }, { "category": "self", "summary": "SUSE Bug 1201471", "url": "https://bugzilla.suse.com/1201471" }, { "category": "self", "summary": "SUSE Bug 1201524", "url": "https://bugzilla.suse.com/1201524" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33061 page", "url": "https://www.suse.com/security/cve/CVE-2021-33061/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4204 page", "url": "https://www.suse.com/security/cve/CVE-2021-4204/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45402 page", "url": "https://www.suse.com/security/cve/CVE-2021-45402/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0264 page", "url": "https://www.suse.com/security/cve/CVE-2022-0264/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0494 page", "url": "https://www.suse.com/security/cve/CVE-2022-0494/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1016 page", "url": "https://www.suse.com/security/cve/CVE-2022-1016/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1184 page", "url": "https://www.suse.com/security/cve/CVE-2022-1184/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1198 page", "url": "https://www.suse.com/security/cve/CVE-2022-1198/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1205 page", "url": "https://www.suse.com/security/cve/CVE-2022-1205/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1508 page", "url": "https://www.suse.com/security/cve/CVE-2022-1508/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1651 page", "url": "https://www.suse.com/security/cve/CVE-2022-1651/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1652 page", "url": "https://www.suse.com/security/cve/CVE-2022-1652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1671 page", "url": "https://www.suse.com/security/cve/CVE-2022-1671/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1734 page", "url": "https://www.suse.com/security/cve/CVE-2022-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1789 page", "url": "https://www.suse.com/security/cve/CVE-2022-1789/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1974 page", "url": "https://www.suse.com/security/cve/CVE-2022-1974/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1998 page", "url": "https://www.suse.com/security/cve/CVE-2022-1998/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21123 page", "url": "https://www.suse.com/security/cve/CVE-2022-21123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21125 page", "url": "https://www.suse.com/security/cve/CVE-2022-21125/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21127 page", "url": "https://www.suse.com/security/cve/CVE-2022-21127/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21166 page", "url": "https://www.suse.com/security/cve/CVE-2022-21166/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21180 page", "url": "https://www.suse.com/security/cve/CVE-2022-21180/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21499 page", "url": "https://www.suse.com/security/cve/CVE-2022-21499/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2318 page", "url": "https://www.suse.com/security/cve/CVE-2022-2318/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23222 page", "url": "https://www.suse.com/security/cve/CVE-2022-23222/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26365 page", "url": "https://www.suse.com/security/cve/CVE-2022-26365/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29582 page", "url": "https://www.suse.com/security/cve/CVE-2022-29582/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-30594 page", "url": "https://www.suse.com/security/cve/CVE-2022-30594/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33740 page", "url": "https://www.suse.com/security/cve/CVE-2022-33740/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33741 page", "url": "https://www.suse.com/security/cve/CVE-2022-33741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33742 page", "url": "https://www.suse.com/security/cve/CVE-2022-33742/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33743 page", "url": "https://www.suse.com/security/cve/CVE-2022-33743/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-21T16:35:09Z", "generator": { "date": "2022-07-21T16:35:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2520-1", "initial_release_date": "2022-07-21T16:35:09Z", "revision_history": [ { "date": "2022-07-21T16:35:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-altera-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-altera-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-amazon-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-amd-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-amd-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-apm-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-apm-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-apple-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-apple-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-apple-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-arm-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-arm-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-cavium-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-exynos-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-freescale-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-lg-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-lg-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-marvell-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-qcom-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-renesas-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-socionext-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-sprd-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "product": { "name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "product_id": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "product": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kernel-syms-5.14.21-150400.24.11.1.aarch64", "product_id": "kernel-syms-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product": { "name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-devel-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-devel-5.14.21-150400.24.11.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-docs-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-docs-5.14.21-150400.24.11.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-docs-html-5.14.21-150400.24.11.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-macros-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-macros-5.14.21-150400.24.11.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-source-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-source-5.14.21-150400.24.11.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "product": { "name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "product_id": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-debug-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "product": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "product": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le", "product_id": "kernel-syms-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "product": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-devel-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-extra-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-default-optional-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "product": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-obs-build-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-syms-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-syms-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "product": { "name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "product_id": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-debug-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-debug-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "product": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "product": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "product": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kernel-syms-5.14.21-150400.24.11.1.x86_64", "product_id": "kernel-syms-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4", "product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64" }, "product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-altera-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-altera-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-amazon-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amd-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-amd-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apm-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-apm-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-apple-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-apple-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-arm-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-arm-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-cavium-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-exynos-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-freescale-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-lg-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-lg-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-marvell-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-qcom-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-renesas-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-socionext-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-sprd-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-debug-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-debug-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64" }, "product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-devel-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-docs-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-docs-html-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-macros-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-source-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch" }, "product_reference": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kernel-syms-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-33061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33061" } ], "notes": [ { "category": "general", "text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33061", "url": "https://www.suse.com/security/cve/CVE-2021-33061" }, { "category": "external", "summary": "SUSE Bug 1196426 for CVE-2021-33061", "url": "https://bugzilla.suse.com/1196426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2021-33061" }, { "cve": "CVE-2021-4204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4204" } ], "notes": [ { "category": "general", "text": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel\u0027s eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4204", "url": "https://www.suse.com/security/cve/CVE-2021-4204" }, { "category": "external", "summary": "SUSE Bug 1194111 for CVE-2021-4204", "url": "https://bugzilla.suse.com/1194111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2021-4204" }, { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45402" } ], "notes": [ { "category": "general", "text": "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45402", "url": "https://www.suse.com/security/cve/CVE-2021-45402" }, { "category": "external", "summary": "SUSE Bug 1196130 for CVE-2021-45402", "url": "https://bugzilla.suse.com/1196130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2021-45402" }, { "cve": "CVE-2022-0264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0264" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0264", "url": "https://www.suse.com/security/cve/CVE-2022-0264" }, { "category": "external", "summary": "SUSE Bug 1194826 for CVE-2022-0264", "url": "https://bugzilla.suse.com/1194826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-0264" }, { "cve": "CVE-2022-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0494" } ], "notes": [ { "category": "general", "text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0494", "url": "https://www.suse.com/security/cve/CVE-2022-0494" }, { "category": "external", "summary": "SUSE Bug 1197386 for CVE-2022-0494", "url": "https://bugzilla.suse.com/1197386" }, { "category": "external", "summary": "SUSE Bug 1207783 for CVE-2022-0494", "url": "https://bugzilla.suse.com/1207783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-0494" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1016", "url": "https://www.suse.com/security/cve/CVE-2022-1016" }, { "category": "external", "summary": "SUSE Bug 1197227 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197227" }, { "category": "external", "summary": "SUSE Bug 1197335 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1016" }, { "cve": "CVE-2022-1184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1184" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1184", "url": "https://www.suse.com/security/cve/CVE-2022-1184" }, { "category": "external", "summary": "SUSE Bug 1198577 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1198577" }, { "category": "external", "summary": "SUSE Bug 1210859 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1210859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1198" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1198", "url": "https://www.suse.com/security/cve/CVE-2022-1198" }, { "category": "external", "summary": "SUSE Bug 1198030 for CVE-2022-1198", "url": "https://bugzilla.suse.com/1198030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1198" }, { "cve": "CVE-2022-1205", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1205" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1205", "url": "https://www.suse.com/security/cve/CVE-2022-1205" }, { "category": "external", "summary": "SUSE Bug 1198027 for CVE-2022-1205", "url": "https://bugzilla.suse.com/1198027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1205" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1508" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1508", "url": "https://www.suse.com/security/cve/CVE-2022-1508" }, { "category": "external", "summary": "SUSE Bug 1198968 for CVE-2022-1508", "url": "https://bugzilla.suse.com/1198968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1508" }, { "cve": "CVE-2022-1651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1651" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1651", "url": "https://www.suse.com/security/cve/CVE-2022-1651" }, { "category": "external", "summary": "SUSE Bug 1199433 for CVE-2022-1651", "url": "https://bugzilla.suse.com/1199433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1651" }, { "cve": "CVE-2022-1652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1652" } ], "notes": [ { "category": "general", "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1652", "url": "https://www.suse.com/security/cve/CVE-2022-1652" }, { "category": "external", "summary": "SUSE Bug 1199063 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1199063" }, { "category": "external", "summary": "SUSE Bug 1200057 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200057" }, { "category": "external", "summary": "SUSE Bug 1200751 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200751" }, { "category": "external", "summary": "SUSE Bug 1201034 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201034" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212307 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1212307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1652" }, { "cve": "CVE-2022-1671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1671" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1671", "url": "https://www.suse.com/security/cve/CVE-2022-1671" }, { "category": "external", "summary": "SUSE Bug 1199439 for CVE-2022-1671", "url": "https://bugzilla.suse.com/1199439" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1671" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1734" } ], "notes": [ { "category": "general", "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1734", "url": "https://www.suse.com/security/cve/CVE-2022-1734" }, { "category": "external", "summary": "SUSE Bug 1199605 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199605" }, { "category": "external", "summary": "SUSE Bug 1199606 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199606" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1734" }, { "cve": "CVE-2022-1789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1789" } ], "notes": [ { "category": "general", "text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1789", "url": "https://www.suse.com/security/cve/CVE-2022-1789" }, { "category": "external", "summary": "SUSE Bug 1199674 for CVE-2022-1789", "url": "https://bugzilla.suse.com/1199674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1789" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1974" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1974", "url": "https://www.suse.com/security/cve/CVE-2022-1974" }, { "category": "external", "summary": "SUSE Bug 1200144 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200144" }, { "category": "external", "summary": "SUSE Bug 1200265 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1998" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1998", "url": "https://www.suse.com/security/cve/CVE-2022-1998" }, { "category": "external", "summary": "SUSE Bug 1200284 for CVE-2022-1998", "url": "https://bugzilla.suse.com/1200284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-1998" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-21123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21123" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21123", "url": "https://www.suse.com/security/cve/CVE-2022-21123" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209075 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1209075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21125" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21125", "url": "https://www.suse.com/security/cve/CVE-2022-21125" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209074 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1209074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21127" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21127", "url": "https://www.suse.com/security/cve/CVE-2022-21127" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1200549" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21166" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21166", "url": "https://www.suse.com/security/cve/CVE-2022-21166" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209073 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1209073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21180" } ], "notes": [ { "category": "general", "text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21180", "url": "https://www.suse.com/security/cve/CVE-2022-21180" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1212313 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1212313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-21180" }, { "cve": "CVE-2022-21499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21499" } ], "notes": [ { "category": "general", "text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21499", "url": "https://www.suse.com/security/cve/CVE-2022-21499" }, { "category": "external", "summary": "SUSE Bug 1199426 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1199426" }, { "category": "external", "summary": "SUSE Bug 1200059 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1200059" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1203034" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212315 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1212315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2318" } ], "notes": [ { "category": "general", "text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2318", "url": "https://www.suse.com/security/cve/CVE-2022-2318" }, { "category": "external", "summary": "SUSE Bug 1201251 for CVE-2022-2318", "url": "https://bugzilla.suse.com/1201251" }, { "category": "external", "summary": "SUSE Bug 1212303 for CVE-2022-2318", "url": "https://bugzilla.suse.com/1212303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23222" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23222", "url": "https://www.suse.com/security/cve/CVE-2022-23222" }, { "category": "external", "summary": "SUSE Bug 1194765 for CVE-2022-23222", "url": "https://bugzilla.suse.com/1194765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-23222" }, { "cve": "CVE-2022-26365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26365" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26365", "url": "https://www.suse.com/security/cve/CVE-2022-26365" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-26365", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-29582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29582" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29582", "url": "https://www.suse.com/security/cve/CVE-2022-29582" }, { "category": "external", "summary": "SUSE Bug 1198811 for CVE-2022-29582", "url": "https://bugzilla.suse.com/1198811" }, { "category": "external", "summary": "SUSE Bug 1199750 for CVE-2022-29582", "url": "https://bugzilla.suse.com/1199750" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-29582" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-30594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-30594" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-30594", "url": "https://www.suse.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "SUSE Bug 1199505 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199505" }, { "category": "external", "summary": "SUSE Bug 1199602 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199602" }, { "category": "external", "summary": "SUSE Bug 1201549 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1201549" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-30594" }, { "cve": "CVE-2022-33740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33740" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33740", "url": "https://www.suse.com/security/cve/CVE-2022-33740" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33740", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33741" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33741", "url": "https://www.suse.com/security/cve/CVE-2022-33741" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33741", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33742" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33742", "url": "https://www.suse.com/security/cve/CVE-2022-33742" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33742", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33743" } ], "notes": [ { "category": "general", "text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33743", "url": "https://www.suse.com/security/cve/CVE-2022-33743" }, { "category": "external", "summary": "SUSE Bug 1200763 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1200763" }, { "category": "external", "summary": "SUSE Bug 1201629 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1201629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-33743" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x", "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x", "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x", "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-21T16:35:09Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2424-1
Vulnerability from csaf_suse
Published
2022-07-18 06:45
Modified
2022-07-18 06:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
The following non-security bugs were fixed:
- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)
- Add various fsctl structs (bsc#1200217).
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx->dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS
- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)
- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: fix snapshot mount option (bsc#1200217).
- [smb3] improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
Patchnames
SUSE-2022-2424,SUSE-SLE-Module-RT-15-SP3-2022-2424,SUSE-SUSE-MicroOS-5.1-2022-2424,SUSE-SUSE-MicroOS-5.2-2022-2424
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add various fsctl structs (bsc#1200217).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)\n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS\n- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)\n- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: fix snapshot mount option (bsc#1200217).\n- [smb3] improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2424,SUSE-SLE-Module-RT-15-SP3-2022-2424,SUSE-SUSE-MicroOS-5.1-2022-2424,SUSE-SUSE-MicroOS-5.2-2022-2424", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2424-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2424-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222424-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2424-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1179195", "url": "https://bugzilla.suse.com/1179195" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1185762", "url": "https://bugzilla.suse.com/1185762" }, { "category": "self", "summary": "SUSE Bug 1192761", "url": "https://bugzilla.suse.com/1192761" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1194013", "url": "https://bugzilla.suse.com/1194013" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198924", "url": "https://bugzilla.suse.com/1198924" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199489", "url": "https://bugzilla.suse.com/1199489" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1200217", "url": "https://bugzilla.suse.com/1200217" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200622", "url": "https://bugzilla.suse.com/1200622" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201143", "url": "https://bugzilla.suse.com/1201143" }, { "category": "self", "summary": "SUSE Bug 1201147", "url": "https://bugzilla.suse.com/1201147" }, { "category": "self", "summary": "SUSE Bug 1201149", "url": "https://bugzilla.suse.com/1201149" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4157 page", "url": "https://www.suse.com/security/cve/CVE-2021-4157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-18T06:45:43Z", "generator": { "date": "2022-07-18T06:45:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2424-1", "initial_release_date": "2022-07-18T06:45:43Z", "revision_history": [ { "date": "2022-07-18T06:45:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-150300.96.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-150300.96.1.noarch", "product_id": "kernel-devel-rt-5.3.18-150300.96.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-150300.96.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-150300.96.1.noarch", "product_id": "kernel-source-rt-5.3.18-150300.96.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt-optional-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64", "product_id": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP3", "product": { "name": "SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-microos:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-150300.96.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-150300.96.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-150300.96.1.noarch as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-150300.96.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3", "product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1", "product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2", "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-4157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4157" } ], "notes": [ { "category": "general", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4157", "url": "https://www.suse.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "SUSE Bug 1194013 for CVE-2021-4157", "url": "https://bugzilla.suse.com/1194013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2021-4157" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch", "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64", "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-18T06:45:43Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2726-1
Vulnerability from csaf_suse
Published
2022-08-09 19:33
Modified
2022-08-09 19:33
Summary
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_46 fixes several issues.
The following security issues were fixed:
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2726,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2724,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2725,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2726,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_46 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830) \n- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2726,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2724,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2725,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2726,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2731", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2726-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2726-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222726-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2726-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201517", "url": "https://bugzilla.suse.com/1201517" }, { "category": "self", "summary": "SUSE Bug 1201656", "url": "https://bugzilla.suse.com/1201656" }, { "category": "self", "summary": "SUSE Bug 1201657", "url": "https://bugzilla.suse.com/1201657" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-09T19:33:44Z", "generator": { "date": "2022-08-09T19:33:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2726-1", "initial_release_date": "2022-08-09T19:33:44Z", "revision_history": [ { "date": "2022-08-09T19:33:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_49-preempt-11-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_49-preempt-11-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_49-preempt-11-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_43-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_46-default-12-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_49-default-11-150300.2.2.x86_64", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_54-default-10-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-09T19:33:44Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2376-1
Vulnerability from csaf_suse
Published
2022-07-12 16:22
Modified
2022-07-12 16:22
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
The following non-security bugs were fixed:
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx->dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).
- smb3: fix snapshot mount option (bsc#1200217).
- smb3 improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).
- smb3 move more common protocol header definitions to smbfs_common (bsc#1200217).
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
Patchnames
SUSE-2022-2376,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2376,openSUSE-SLE-15.3-2022-2376
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)\n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).\n- smb3: fix snapshot mount option (bsc#1200217).\n- smb3 improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).\n- smb3 move more common protocol header definitions to smbfs_common (bsc#1200217).\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2376,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2376,openSUSE-SLE-15.3-2022-2376", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2376-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2376-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222376-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2376-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1179195", "url": "https://bugzilla.suse.com/1179195" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1185762", "url": "https://bugzilla.suse.com/1185762" }, { "category": "self", "summary": "SUSE Bug 1192761", "url": "https://bugzilla.suse.com/1192761" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1194013", "url": "https://bugzilla.suse.com/1194013" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199489", "url": "https://bugzilla.suse.com/1199489" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1200217", "url": "https://bugzilla.suse.com/1200217" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200622", "url": "https://bugzilla.suse.com/1200622" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201143", "url": "https://bugzilla.suse.com/1201143" }, { "category": "self", "summary": "SUSE Bug 1201147", "url": "https://bugzilla.suse.com/1201147" }, { "category": "self", "summary": "SUSE Bug 1201149", "url": "https://bugzilla.suse.com/1201149" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4157 page", "url": "https://www.suse.com/security/cve/CVE-2021-4157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-12T16:22:59Z", "generator": { "date": "2022-07-12T16:22:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2376-1", "initial_release_date": "2022-07-12T16:22:59Z", "revision_history": [ { "date": "2022-07-12T16:22:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "product_id": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-150300.38.69.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-150300.38.69.1.noarch", "product_id": "kernel-source-azure-5.3.18-150300.38.69.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-azure-optional-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3" } } }, { "category": "product_name", "name": "openSUSE Leap 15.3", "product": { "name": "openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.69.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.69.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-150300.38.69.1.noarch as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-150300.38.69.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64 as component of openSUSE Leap 15.3", "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" }, "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-4157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4157" } ], "notes": [ { "category": "general", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4157", "url": "https://www.suse.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "SUSE Bug 1194013 for CVE-2021-4157", "url": "https://bugzilla.suse.com/1194013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2021-4157" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.69.1.noarch", "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.69.1.x86_64", "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.69.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-12T16:22:59Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2759-1
Vulnerability from csaf_suse
Published
2022-08-10 12:06
Modified
2022-08-10 12:06
Summary
Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP3)
Notes
Title of the patch
Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP3)
Description of the patch
This update for the Linux Kernel 5.3.18-150300_59_68 fixes several issues.
The following security issues were fixed:
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
Patchnames
SUSE-2022-2759,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2759
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP3)", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 5.3.18-150300_59_68 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2759,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2759", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2759-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2759-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222759-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2759-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP3)", "tracking": { "current_release_date": "2022-08-10T12:06:04Z", "generator": { "date": "2022-08-10T12:06:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2759-1", "initial_release_date": "2022-08-10T12:06:04Z", "revision_history": [ { "date": "2022-08-10T12:06:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "product_id": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "product": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "product_id": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-150300_59_68-preempt-5-150300.2.2.x86_64", "product": { "name": "kernel-livepatch-5_3_18-150300_59_68-preempt-5-150300.2.2.x86_64", "product_id": "kernel-livepatch-5_3_18-150300_59_68-preempt-5-150300.2.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3", "product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T12:06:04Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T12:06:04Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.s390x", "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_68-default-5-150300.2.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-10T12:06:04Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
suse-su-2022:2615-1
Vulnerability from csaf_suse
Published
2022-08-01 08:42
Modified
2022-08-01 08:42
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP4 kernel was updated.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).
- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).
- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).
- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)
- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)
- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)
- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)
- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)
- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)
- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)
- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)
- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)
- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)
- CVE-2022-0264: Fixed a vulnerability in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)
- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).
- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)
- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)
- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).
- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).
- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).
- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).
- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)
- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it's been trivial to break out of it with kgdb or kdb. (bsc#1199426)
- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)
- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)
- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).
- CVE-2022-1679: Fixed use-after-free in ath9k in ath9k_hif_usb_rx_cb (bsc#1199487).
- CVE-2022-20132: Fixed several potential out of bounds reads via malicious HID device (bsc#1200619).
- CVE-2022-1012: Fixed an information leak in net/ipv4/tcp.c (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bnc#1200692).
- CVE-2022-1998: Fixed use-after-free in fanotify (bnc#1200284).
The following non-security bugs were fixed:
- ACPI: APEI: fix return value of __setup handlers (git-fixes).
- ACPI/APEI: Limit printable size of BERT table data (git-fixes).
- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).
- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).
- ACPICA: Avoid cache flush inside virtual machines (git-fixes).
- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).
- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).
- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).
- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).
- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).
- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).
- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).
- ACPI/IORT: Check node revision for PMCG resources (git-fixes).
- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).
- ACPI: PM: Revert 'Only mark EC GPE for wakeup on Intel systems' (git-fixes).
- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).
- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).
- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).
- ACPI: processor idle: Check for architectural support for LPI (git-fixes).
- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).
- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).
- ACPI: property: Release subnode properties with data nodes (git-fixes).
- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).
- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).
- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).
- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).
- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)
- Add references to IBM bugs
- Add various fsctl structs (bsc#1193629).
- Adjust cifssb maximum read size (bsc#1193629).
- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).
- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).
- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).
- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).
- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).
- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).
- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).
- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).
- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).
- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).
- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).
- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).
- ALSA: hda: Fix driver index handling at re-binding (git-fixes).
- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).
- ALSA: hda: Fix regression on forced probe mask option (git-fixes).
- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).
- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).
- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).
- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).
- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).
- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).
- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).
- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).
- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).
- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).
- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).
- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).
- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).
- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).
- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).
- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).
- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).
- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).
- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).
- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).
- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).
- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).
- ALSA: hda: Set max DMA segment size (git-fixes).
- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).
- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).
- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).
- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).
- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).
- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).
- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).
- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).
- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).
- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).
- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).
- ALSA: pcm: Test for 'silence' field in struct 'pcm_format_data' (git-fixes).
- ALSA: spi: Add check for clk_enable() (git-fixes).
- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).
- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).
- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).
- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).
- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).
- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).
- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).
- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).
- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).
- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).
- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).
- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- ALSA: usb-audio: Increase max buffer size (git-fixes).
- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).
- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).
- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).
- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).
- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).
- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).
- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).
- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).
- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).
- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).
- ALSA: wavefront: Proper check of get_user() error (git-fixes).
- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).
- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).
- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).
- amd/display: set backlight only if required (git-fixes).
- arch/arm64: Fix topology initialization for core scheduling (git-fixes).
- arm64: Add Cortex-A510 CPU part definition (git-fixes).
- arm64: Add part number for Arm Cortex-A78AE (git-fixes).
- arm64: Add support for user sub-page fault probing (git-fixes)
- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).
- arm64: avoid fixmap race condition when create pud mapping (git-fixes).
- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).
- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).
- arm64: defconfig: build imx-sdma as a module (git-fixes).
- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).
- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).
- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).
- arm64: dts: agilex: use the compatible 'intel,socfpga-agilex-hsotg' (git-fixes).
- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).
- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).
- arm64: dts: broadcom: Fix sata nodename (git-fixes).
- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).
- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)
- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).
- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)
- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)
- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).
- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).
- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 & mmc settings (git-fixes).
- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).
- arm64: dts: imx8mq: fix lcdif port node (git-fixes).
- arm64: dts: imx8qm: Correct SCU clock controller's compatible (git-fixes)
- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).
- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).
- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).
- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).
- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).
- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).
- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).
- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).
- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).
- arm64: dts: meson-g12b-odroid-n2: fix typo 'dio2133' (git-fixes).
- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).
- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).
- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).
- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).
- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).
- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).
- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).
- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).
- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).
- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).
- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).
- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).
- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).
- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).
- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).
- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).
- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).
- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).
- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).
- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel's vddio-supply property (git-fixes).
- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).
- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).
- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).
- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).
- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).
- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).
- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).
- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).
- arm64: dts: renesas: Fix thermal bindings (git-fixes).
- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).
- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).
- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).
- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).
- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).
- arm64: dts: ti: j7200-main: Fix 'dtbs_check' serdes_ln_ctrl node (git-fixes).
- arm64: dts: ti: j721e-main: Fix 'dtbs_check' in serdes_ln_ctrl node (git-fixes).
- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).
- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).
- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).
- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).
- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).
- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)
- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).
- arm64: fix types in copy_highpage() (git-fixes).
- arm64: ftrace: consistently handle PLTs (git-fixes).
- arm64: ftrace: fix branch range checks (git-fixes).
- arm64: kasan: fix include error in MTE functions (git-fixes).
- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).
- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)
- arm64: mm: Drop 'const' from conditional arm64_dma_phys_limit definition (git-fixes).
- arm64: mm: fix p?d_leaf() (git-fixes).
- arm64: module: remove (NOLOAD) from linker script (git-fixes).
- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).
- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).
- arm64: patch_text: Fixup last cpu should be master (git-fixes).
- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).
- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).
- arm64: stackleak: fix current_top_of_stack() (git-fixes).
- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)
- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).
- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).
- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module
- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).
- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).
- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).
- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).
- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).
- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).
- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).
- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).
- ARM: at91: pm: use proper compatible for sama5d2's rtc (git-fixes).
- ARM: at91: pm: use proper compatibles for sam9x60's rtc and rtt (git-fixes).
- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).
- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).
- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).
- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).
- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).
- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).
- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).
- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).
- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).
- ARM: dts: aspeed: Add secure boot controller node (git-fixes).
- ARM: dts: aspeed: Add video engine to g6 (git-fixes).
- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).
- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).
- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).
- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).
- ARM: dts: at91: fix pinctrl phandles (git-fixes).
- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).
- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).
- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).
- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).
- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).
- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).
- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).
- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).
- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).
- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).
- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).
- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).
- ARM: dts: BCM5301X: update CRU block description (git-fixes).
- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).
- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).
- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).
- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).
- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).
- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).
- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).
- ARM: dts: Fix boot regression on Skomer (git-fixes).
- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).
- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).
- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).
- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).
- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).
- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).
- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).
- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).
- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).
- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).
- ARM: dts: imx7ulp: Fix 'assigned-clocks-parents' typo (git-fixes).
- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).
- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)
- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).
- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).
- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).
- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).
- ARM: dts: meson: Fix the UART compatible strings (git-fixes).
- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).
- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).
- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).
- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).
- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).
- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).
- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).
- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).
- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).
- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).
- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).
- ARM: dts: socfpga: change qspi to 'intel,socfpga-qspi' (git-fixes).
- ARM: dts: spear1340: Update serial node properties (git-fixes).
- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).
- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).
- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).
- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).
- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).
- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).
- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).
- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).
- ARM: fix build warning in proc-v7-bugs.c (git-fixes).
- ARM: fix co-processor register typo (git-fixes).
- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).
- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).
- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).
- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).
- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).
- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).
- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).
- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).
- ARM: mediatek: select arch timer for mt7629 (git-fixes).
- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).
- ARM: mmp: Fix failure to remove sram device (git-fixes).
- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).
- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).
- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).
- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).
- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).
- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).
- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).
- ARM: pxa: maybe fix gpio lookup tables (git-fixes).
- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).
- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).
- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).
- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).
- ASoC: amd: Fix reference to PCM buffer address (git-fixes).
- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).
- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).
- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).
- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).
- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).
- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).
- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).
- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).
- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).
- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).
- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).
- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).
- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).
- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).
- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).
- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).
- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).
- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs4265: Fix the duplicated control name (git-fixes).
- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).
- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).
- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).
- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).
- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: fsi: Add check for clk_enable (git-fixes).
- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).
- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).
- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).
- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).
- ASoC: fsl: Use dev_err_probe() helper (git-fixes).
- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).
- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).
- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).
- ASoC: intel: skylake: Set max DMA segment size (git-fixes).
- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).
- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13' (git-fixes).
- ASoC: madera: Add dependencies on MFD (git-fixes).
- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).
- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).
- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).
- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).
- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).
- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).
- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).
- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).
- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).
- ASoC: mediatek: use of_device_get_match_data() (git-fixes).
- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).
- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).
- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).
- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).
- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).
- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).
- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).
- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).
- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).
- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).
- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).
- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).
- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).
- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).
- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).
- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).
- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).
- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).
- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).
- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).
- ASoC: rt5514: Fix event generation for 'DSP Voice Wake Up' control (git-fixes).
- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).
- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).
- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).
- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).
- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).
- ASoC: samsung: Use dev_err_probe() helper (git-fixes).
- ASoC: simple-card: fix probe failure on platform component (git-fixes).
- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).
- ASoC: soc-compress: Change the check for codec_dai (git-fixes).
- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).
- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).
- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).
- ASoC: soc-ops: fix error handling (git-fixes).
- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).
- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).
- ASoC: SOF: hda: Set max DMA segment size (git-fixes).
- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).
- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).
- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).
- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).
- ASoC: SOF: topology: remove redundant code (git-fixes).
- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).
- ASoC: tas2770: Insert post reset delay (git-fixes).
- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).
- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).
- ASoC: topology: Allow TLV control to be either read or write (git-fixes).
- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).
- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).
- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).
- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).
- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).
- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).
- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).
- assoc_array: Fix BUG_ON during garbage collect (git-fixes).
- asus-wmi: Add dgpu disable method (bsc#1198058).
- asus-wmi: Add egpu enable method (bsc#1198058).
- asus-wmi: Add panel overdrive functionality (bsc#1198058).
- asus-wmi: Add support for platform_profile (bsc#1198058).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).
- ata: libata-core: Disable TRIM on M88V29 (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).
- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).
- ata: pata_hpt37x: fix PCI clock detection (git-fixes).
- ata: pata_marvell: Check the 'bmdma_addr' beforing reading (git-fixes).
- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).
- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).
- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).
- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).
- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).
- ath11k: acquire ab->base_lock in unassign when finding the peer by addr (git-fixes).
- ath11k: disable spectral scan during spectral deinit (git-fixes).
- ath11k: Do not check arvif->is_started before sending management frames (git-fixes).
- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).
- ath11k: mhi: use mhi_sync_power_up() (git-fixes).
- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).
- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).
- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).
- ath9k: fix ar9003_get_eepmisc (git-fixes).
- ath9k: fix QCA9561 PA bias level (git-fixes).
- ath9k: Fix usage of driver-private space in tx_info (git-fixes).
- ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix (git-fixes).
- ath9k_htc: fix uninit value bugs (git-fixes).
- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).
- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).
- atm: eni: Add check for dma_map_single (git-fixes).
- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).
- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).
- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).
- audit: improve audit queue handling when 'audit=1' on cmdline (git-fixes).
- audit: improve robustness of the audit queue handling (git-fixes).
- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).
- auxdisplay: lcd2s: Fix memory leak in ->remove() (git-fixes).
- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).
- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).
- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).
- b43: Fix assigning negative value to unsigned variable (git-fixes).
- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).
- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).
- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).
- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).
- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).
- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bfq: Allow current waker to defend against a tentative one (bsc#1195915).
- bfq: Avoid false marking of bic as stably merged (bsc#1197926).
- bfq: Avoid merging queues with different parents (bsc#1197926).
- bfq: Do not let waker requests skip proper accounting (bsc#1184318).
- bfq: Drop pointless unlock-lock pair (bsc#1197926).
- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).
- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).
- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).
- bfq: Limit waker detection in time (bsc#1184318).
- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).
- bfq: Relax waker detection for shared queues (bsc#1184318).
- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).
- bfq: Split shared queues on move between cgroups (bsc#1197926).
- bfq: Store full bitmap depth in bfq_data (bsc#1184318).
- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).
- bfq: Track whether bfq_group is still online (bsc#1197926).
- bfq: Update cgroup information before merging bio (bsc#1197926).
- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).
- bitfield: add explicit inclusions to the example (git-fixes).
- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).
- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).
- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).
- blk-mq: do not touch ->tagset in blk_mq_get_sq_hctx (bsc#1200824).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: fix tag_get wait task can't be awakened (bsc#1200263).
- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).
- blktrace: fix use after free for struct blk_trace (bsc#1198017).
- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).
- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).
- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).
- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).
- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).
- block: do not delete queue kobject before its children (bsc#1198019).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).
- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).
- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).
- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).
- block: Fix up kabi after blkcg merge fix (bsc#1198020).
- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).
- block: limit request dispatch loop duration (bsc#1198022).
- block/mq-deadline: Improve request accounting further (bsc#1198009).
- block: Provide blk_mq_sched_get_icq() (bsc#1184318).
- block: update io_ticks when io hang (bsc#1197817).
- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).
- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).
- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).
- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).
- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).
- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).
- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).
- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).
- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).
- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).
- Bluetooth: Fix the creation of hdev->name (git-fixes).
- Bluetooth: Fix use after free in hci_send_acl (git-fixes).
- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).
- Bluetooth: hci_serdev: call init_rwsem() before p->open() (git-fixes).
- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).
- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).
- Bluetooth: use memset avoid memory leaks (git-fixes).
- bnx2x: fix napi API usage sequence (bsc#1198217).
- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).
- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).
- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).
- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).
- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).
- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).
- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).
- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).
- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).
- bnxt_en: Increase firmware message response DMA wait time (git-fixes).
- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).
- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).
- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).
- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).
- bonding: fix data-races around agg_select_timer (git-fixes).
- bonding: force carrier update when releasing slave (git-fixes).
- bonding: pair enable_port with slave_arr_updates (git-fixes).
- bpf: Add check_func_arg_reg_off function (git-fixes).
- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).
- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).
- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).
- bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg (git-fixes).
- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).
- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).
- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).
- bpf: Resolve to prog->aux->dst_prog->type only for BPF_PROG_TYPE_EXT (git-fixes).
- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#927455 bsc#1198585).
- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).
- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).
- bpftool: Fix memory leak in prog_dump() (git-fixes).
- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).
- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).
- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).
- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).
- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).
- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).
- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).
- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).
- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).
- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).
- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).
- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).
- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).
- btrfs: add ro compat flags to inodes (bsc#1197915).
- btrfs: always update the logged transaction when logging new names (bsc#1197915).
- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).
- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).
- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).
- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).
- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)
- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).
- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).
- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).
- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).
- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).
- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).
- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).
- btrfs: constify and cleanup variables in comparators (bsc#1197915).
- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).
- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).
- btrfs: do not pin logs too early during renames (bsc#1197915).
- btrfs: drop the _nr from the item helpers (bsc#1197915).
- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).
- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).
- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).
- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).
- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).
- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).
- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).
- btrfs: improve the batch insertion of delayed items (bsc#1197915).
- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).
- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).
- btrfs: introduce item_nr token variant helpers (bsc#1197915).
- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).
- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).
- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).
- btrfs: only copy dir index keys when logging a directory (bsc#1197915).
- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).
- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).
- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).
- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).
- btrfs: remove root argument from add_link() (bsc#1197915).
- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).
- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).
- btrfs: remove root argument from check_item_in_log() (bsc#1197915).
- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).
- btrfs: remove the btrfs_item_end() helper (bsc#1197915).
- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).
- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).
- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).
- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).
- btrfs: unexport setup_items_for_insert() (bsc#1197915).
- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).
- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).
- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).
- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots > nritems (bsc#1197915).
- btrfs: use single bulk copy operations when logging directories (bsc#1197915).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).
- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).
- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: etas_es58x: change opened_channel_cnt's type from atomic_t to u8 (git-fixes).
- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).
- can: grcan: grcan_close(): fix deadlock (git-fixes).
- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).
- can: grcan: only use the NAPI poll budget for RX (git-fixes).
- can: grcan: use ofdev->dev when allocating DMA memory (git-fixes).
- can: gs_usb: change active_channels's type from atomic_t to u8 (git-fixes).
- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).
- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).
- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).
- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).
- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).
- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).
- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).
- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).
- can: mcba_usb: properly check endpoint type (git-fixes).
- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).
- can: mcp251xfd: silence clang's -Wunaligned-access warning (git-fixes).
- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).
- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).
- can: xilinx_can: mark bit timing constants as const (git-fixes).
- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).
- carl9170: tx: fix an incorrect use of list iterator (git-fixes).
- CDC-NCM: avoid overflow in sanity checking (git-fixes).
- ceph: fix setting of xattrs on async created inodes (bsc#1199611).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).
- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).
- cfg80211: fix race in netlink owner interface destruction (git-fixes).
- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).
- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).
- cgroup/cpuset: Fix 'suspicious RCU usage' lockdep warning (bsc#1196868).
- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).
- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).
- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).
- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).
- cifs: avoid parallel session setups on same channel (bsc#1193629).
- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).
- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).
- cifs: call helper functions for marking channels for reconnect (bsc#1193629).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).
- cifs: check for smb1 in open_cached_dir() (bsc#1193629).
- cifs: check reconnects for channels of active tcons too (bsc#1193629).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).
- cifs: clean up an inconsistent indenting (bsc#1193629).
- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).
- cifs: do not skip link targets when an I/O fails (bsc#1194625).
- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).
- cifs: fix bad fids sent over wire (bsc#1197157).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).
- cifs: fix handlecache and multiuser (bsc#1193629).
- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).
- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).
- cifs: fix minor compile warning (bsc#1193629).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).
- cifs: fix potential deadlock in direct reclaim (bsc#1193629).
- cifs: fix potential double free during failed mount (bsc#1193629).
- cifs: fix potential race with cifsd thread (bsc#1193629).
- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).
- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).
- cifs: fix the connection state transitions with multichannel (bsc#1193629).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).
- cifs: fix workstation_name for multiuser mounts (bsc#1193629).
- cifs: force new session setup and tcon for dfs (bsc#1193629).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).
- cifs: make status checks in version independent callers (bsc#1193629).
- cifs: mark sessions for reconnection in helper function (bsc#1193629).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).
- cifs: move superblock magic defitions to magic.h (bsc#1193629).
- cifs: potential buffer overflow in handling symlinks (bsc#1193629).
- cifs: print TIDs as hex (bsc#1193629).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).
- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).
- cifs: release cached dentries only if mount is complete (bsc#1193629).
- cifs: remove check of list iterator against head past the loop body (bsc#1193629).
- cifs: remove redundant assignment to pointer p (bsc#1193629).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).
- cifs: remove repeated state change in dfs tree connect (bsc#1193629).
- cifs: remove unused variable ses_selected (bsc#1193629).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).
- cifs: return the more nuanced writeback error on close() (bsc#1193629).
- cifs: serialize all mount attempts (bsc#1193629).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).
- cifs: skip trailing separators of prefix paths (bsc#1193629).
- cifs: smbd: fix typo in comment (bsc#1193629).
- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).
- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).
- cifs: update internal module number (bsc#1193629).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).
- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).
- cifs: use new enum for ses_status (bsc#1193629).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).
- cifs: writeback fix (bsc#1193629).
- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).
- clk: at91: generated: consider range when calculating best rate (git-fixes).
- clk: at91: sama7g5: fix parents of PDMCs' GCLK (git-fixes).
- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).
- clk: bcm2835: Remove unused variable (git-fixes).
- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).
- clk: Enforce that disjoints limits are invalid (git-fixes).
- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).
- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).
- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).
- clk: imx8mp: fix usb_root_clk parent (git-fixes).
- clk: imx: Add check for kcalloc (git-fixes).
- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).
- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- clk: Initialize orphan req_rate (git-fixes).
- clk: jz4725b: fix mmc0 clock gating (git-fixes).
- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).
- clk: nxp: Remove unused variable (git-fixes).
- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).
- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).
- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).
- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).
- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).
- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).
- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).
- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).
- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).
- clk: tegra: Add missing reset deassertion (git-fixes).
- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).
- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).
- clk: uniphier: Fix fixed-rate initialization (git-fixes).
- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).
- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).
- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).
- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).
- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).
- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).
- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).
- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).
- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).
- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).
- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).
- copy_process(): Move fd_install() out of sighand->siglock critical section (bsc#1199626).
- cpufreq-fix-memory-leak-in-sun50i_cpufreq_nvmem_prob.patch: (git-fixes).
- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).
- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).
- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).
- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).
- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).
- cputime, cpuacct: Include guest time in user time in (git-fixes)
- crypto: amlogic - call finalize with bh disabled (git-fixes).
- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).
- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).
- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).
- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).
- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).
- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).
- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).
- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).
- crypto: ccree - use fine grained DMA mapping dir (git-fixes).
- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).
- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).
- crypto: engine - check if BH is disabled during completion (git-fixes).
- crypto: gemini - call finalize with bh disabled (git-fixes).
- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).
- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).
- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).
- crypto: marvell/cesa - ECB does not IV (git-fixes).
- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).
- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).
- crypto: qat - disable registration of algorithms (git-fixes).
- crypto: qat - do not cast parameter in bit operations (git-fixes).
- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).
- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).
- crypto: rockchip - ECB does not need IV (git-fixes).
- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).
- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).
- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).
- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).
- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).
- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).
- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).
- crypto: sun8i-ss - handle zero sized sg (git-fixes).
- crypto: sun8i-ss - really disable hash on A80 (git-fixes).
- crypto: sun8i-ss - rework handling of IV (git-fixes).
- crypto: vmx - add missing dependencies (git-fixes).
- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).
- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).
- crypto: xts - Add softdep on ecb (git-fixes).
- dax: fix cache flush on PMD-mapped pages (bsc#1200830).
- devlink: Add 'enable_iwarp' generic device param (bsc#1200502).
- dim: initialize all struct fields (git-fixes).
- display/amd: decrease message verbosity about watermarks table failure (git-fixes).
- dma: at_xdmac: fix a missing check on list iterator (git-fixes).
- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).
- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).
- dma-debug: fix return value of __setup handlers (git-fixes).
- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).
- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).
- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).
- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).
- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).
- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).
- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).
- dmaengine: idxd: fix device cleanup on disable (git-fixes).
- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).
- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).
- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).
- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).
- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).
- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).
- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).
- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).
- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).
- dmaengine: Revert 'dmaengine: shdma: Fix runtime PM imbalance on error' (git-fixes).
- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).
- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).
- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).
- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).
- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).
- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).
- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).
- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).
- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).
- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).
- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).
- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).
- dm integrity: set journal entry unused when shrinking device (git-fixes).
- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).
- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).
- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).
- doc/ip-sysctl: add bc_forwarding (git-fixes).
- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).
- Documentation: add link to stable release candidate tree (git-fixes).
- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).
- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).
- Documentation: update stable tree link (git-fixes).
- do not call utsname() after ->nsproxy is NULL (bsc#1201196).
- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).
- drbd: fix duplicate array initializer (git-fixes).
- drbd: Fix five use after free bugs in get_initial_state (git-fixes).
- drbd: remove assign_p_sizes_qlim (git-fixes).
- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).
- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).
- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).
- driver base: fix compaction sysfs file leak (git-fixes).
- driver: base: fix UAF when driver_attach failed (git-fixes).
- driver core: dd: fix return value of __setup handler (git-fixes).
- driver core: fix deadlock in __device_attach (git-fixes).
- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).
- driver core: Free DMA range map when device is released (git-fixes).
- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).
- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).
- driver: hv: Rename 'alloced' to 'allocated' (git-fixes).
- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).
- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).
- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).
- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).
- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).
- driver: net: xgene: Fix regression in CRC stripping (git-fixes).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).
- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).
- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).
- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).
- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).
- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).
- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).
- drm: add a locked version of drm_is_current_master (git-fixes).
- drm: Add orientation quirk for GPD Win Max (git-fixes).
- drm/amd: Add USBC connector ID (git-fixes).
- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).
- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).
- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).
- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).
- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).
- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).
- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).
- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).
- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).
- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).
- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).
- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).
- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).
- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).
- drm/amd/display: Enable power gating before init_pipes (git-fixes).
- drm/amd/display: FEC check in timing validation (git-fixes).
- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).
- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).
- drm/amd/display: fix audio format not updated after edid updated (git-fixes).
- drm/amd/display: Fix memory leak (git-fixes).
- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)
- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).
- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).
- drm/amd/display: fix yellow carp wm clamping (git-fixes).
- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15' Apple Retina panels (git-fixes).
- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).
- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).
- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).
- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).
- drm/amd/display: Revert FEC check in validation (git-fixes).
- drm/amd/display: Update VTEM Infopacket definition (git-fixes).
- drm/amd/display: Update watermark values for DCN301 (git-fixes).
- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).
- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).
- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).
- drm/amdgpu: add beige goby PCI ID (git-fixes).
- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).
- drm/amdgpu: check vm ready by amdgpu_vm->evicting flag (git-fixes).
- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).
- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).
- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).
- drm/amdgpu/display: add support for multiple backlights (git-fixes).
- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).
- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).
- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).
- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).
- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).
- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).
- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).
- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).
- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).
- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)
- drm/amdgpu: fix logic inversion in check (git-fixes).
- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).
- drm/amdgpu: Fix recursive locking warning (git-fixes).
- drm/amdgpu: fix suspend/resume hang regression (git-fixes).
- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).
- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).
- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).
- drm/amdgpu: suppress the warning about enum value 'AMD_IP_BLOCK_TYPE_NUM' (git-fixes).
- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).
- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).
- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).
- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).
- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).
- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)
- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).
- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).
- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).
- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).
- drm/amdkfd: Fix GWS queue count (bsc#1190786)
- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).
- drm/amdkfd: make CRAT table missing message informational only (git-fixes).
- drm/amdkfd: remove unused function (git-fixes).
- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).
- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).
- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).
- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).
- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).
- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).
- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).
- drm/amd/pm: Fix missing thermal throttler status (git-fixes).
- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).
- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).
- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).
- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).
- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).
- drm/ast: Create threshold values for AST2600 (bsc#1190786)
- drm/atomic: Do not pollute crtc_state->mode_blob with error pointers (git-fixes).
- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).
- drm: avoid circular locks in drm_mode_getconnector (git-fixes).
- drm/blend: fix typo in the comment (git-fixes).
- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).
- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).
- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).
- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).
- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).
- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).
- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).
- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).
- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).
- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).
- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).
- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).
- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)
- drm: bridge: icn6211: Fix register layout (git-fixes).
- drm: bridge: it66121: Fix the register page length (git-fixes).
- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).
- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)
- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).
- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).
- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).
- drm/connector: Fix typo in output format (bsc#1190786)
- drm/doc: overview before functions for drm_writeback.c (git-fixes).
- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)
- drm/edid: Always set RGB444 (git-fixes).
- drm/edid: check basic audio support on CEA extension block (git-fixes).
- drm/edid: Do not clear formats if using deep color (git-fixes).
- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)
- drm/edid: fix invalid EDID extension block filtering (git-fixes).
- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).
- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).
- drm/fourcc: fix integer type usage in uapi header (git-fixes).
- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).
- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).
- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)
- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).
- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).
- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).
- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).
- drm/i915/display: Move DRRS code its own file (git-fixes).
- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).
- drm/i915/display: split out dpt out of intel_display.c (git-fixes).
- drm/i915/dmc: Add MMIO range restrictions (git-fixes).
- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).
- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).
- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).
- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).
- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).
- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).
- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)
- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)
- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).
- drm/i915/gem: add missing boundary check in vm_access (git-fixes).
- drm/i915/gem: add missing else (git-fixes).
- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).
- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).
- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).
- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).
- drm/i915: Keep gem ctx->vm alive until the final put (bsc#1190497)
- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).
- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).
- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).
- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).
- drm/i915/ttm: ensure we unmap when purging (git-fixes).
- drm/i915/ttm: tweak priority hint selection (git-fixes).
- drm/i915: Widen the QGV point mask (git-fixes).
- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).
- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).
- drm: imx: fix compiler warning with gcc-12 (git-fixes).
- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).
- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).
- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).
- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).
- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).
- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).
- drm: mali-dp: potential dereference of null pointer (git-fixes).
- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)
- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).
- drm/mediatek: Fix mtk_cec_mask() (git-fixes).
- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).
- drm/meson: Fix error handling when afbcd.ops->init fails (git-fixes).
- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).
- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).
- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).
- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).
- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).
- drm/msm: add missing include to msm_drv.c (git-fixes).
- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).
- drm/msm/disp: check the return value of kzalloc() (git-fixes).
- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)
- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).
- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).
- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).
- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).
- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).
- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)
- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).
- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).
- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).
- drm/msm/dp: force link training for display resolution change (git-fixes).
- drm/msm/dp: Modify prototype of encoder based API (git-fixes).
- drm/msm/dp: populate connector of struct dp_panel (git-fixes).
- drm/msm/dp: remove fail safe mode related code (git-fixes).
- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).
- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)
- drm/msm/dp: stop link training after link training 2 failed (git-fixes).
- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)
- drm/msm/dpu: add DSPP blocks teardown (git-fixes).
- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).
- drm/msm/dpu: fix dp audio condition (git-fixes).
- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)
- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).
- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).
- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).
- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).
- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).
- drm/msm/dsi: Use 'ref' fw clock instead of global name for VCO parent (git-fixes).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).
- drm/msm: Fix range size vs end confusion (git-fixes).
- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).
- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/msm/mdp5: check the return of kzalloc() (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).
- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).
- drm/msm: properly add and remove internal bridges (bsc#1190768)
- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)
- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).
- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).
- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).
- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).
- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).
- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).
- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).
- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).
- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).
- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).
- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).
- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).
- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).
- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).
- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).
- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).
- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).
- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).
- drm/panfrost: Check for error num after setting mask (git-fixes).
- drm/plane: Move range check for format_count earlier (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).
- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).
- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).
- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).
- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).
- drm/simpledrm: Add 'panel orientation' property on non-upright mounted LCD panels (git-fixes).
- drm: sti: do not use kernel-doc markers (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).
- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)
- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).
- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).
- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).
- drm: use the lookup lock in drm_is_current_master (git-fixes).
- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).
- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).
- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).
- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).
- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).
- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).
- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).
- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).
- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).
- drm/vc4: hvs: Fix frame count register readout (git-fixes).
- drm/vc4: hvs: Reset muxes at probe time (git-fixes).
- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).
- drm/vc4: txp: Force alpha to be 0xff if it's disabled (git-fixes).
- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).
- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).
- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).
- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).
- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).
- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).
- drm/vmwgfx: Remove unused compile options (bsc#1190786)
- drm/vmwgfx: validate the screen formats (git-fixes).
- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).
- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).
- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).
- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).
- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).
- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).
- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).
- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).
- dt-bindings: net: xgmac_mdio: Remove unsupported 'bus-frequency' (git-fixes).
- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).
- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).
- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).
- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).
- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).
- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).
- dt-bindings: usb: hcd: correct usb-device path (git-fixes).
- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).
- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).
- e1000e: Correct NVM checksum verification flow (bsc#1191663).
- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).
- e1000e: Fix possible overflow in LTR decoding (git-fixes).
- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).
- e1000e: Separate ADP board type from TGP (git-fixes).
- EDAC/altera: Fix deferred probing (bsc#1190497).
- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).
- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).
- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).
- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).
- EDAC/xgene: Fix deferred probing (bsc#1190497).
- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).
- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).
- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).
- efi: fix return value of __setup handlers (git-fixes).
- efivars: Respect 'block' flag in efivar_entry_set_safe() (git-fixes).
- enable DRM_BOCHS as module (bsc#1200572)
- epic100: fix use after free on rmmod (git-fixes).
- ethernet/sfc: remove redundant rc variable (bsc#1196306).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext2: correct max file size computing (bsc#1197820).
- ext4: avoid trim error on fs with small groups (bsc#1191271).
- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).
- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix ext4_fc_stats trace point (git-fixes).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- ext4: reject the 'commit' option on ext2 filesystems (bsc#1200808).
- extcon: Modify extcon device to be created after driver data is set (git-fixes).
- extcon: ptn5150: Add queue work sync before driver release (git-fixes).
- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).
- fbcon: Avoid 'cap' set but not used warning (bsc#1190786)
- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).
- firewire: core: extend card->lock in fw_core_handle_bus_reset (git-fixes).
- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).
- firewire: remove check of list iterator against head past the loop body (git-fixes).
- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).
- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).
- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).
- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).
- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).
- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).
- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).
- firmware: google: Properly state IOMEM dependency (git-fixes).
- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).
- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).
- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).
- firmware: sysfb: fix platform-device leak in error path (git-fixes).
- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).
- firmware: use kernel credentials when reading firmware (git-fixes).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1193629).
- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).
- fs: fix fd table size alignment properly (bsc#1200882).
- fs: handle circular mappings correctly (bsc#1197918).
- fsl_lpuart: Do not enable interrupts too early (git-fixes).
- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).
- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).
- fsnotify: fix wrong lockdep annotations (bsc#1200815).
- ftrace: Clean up hash direct_functions on register failures (git-fixes).
- fuse: fix fileattr op failure (bsc#1197292).
- gen_init_cpio: fix short read file handling (bsc#1193289).
- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)
- genirq: Synchronize interrupt thread startup (git-fixes)
- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).
- gma500: fix an incorrect NULL check on list iterator (git-fixes).
- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).
- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).
- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).
- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).
- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).
- gpiolib: acpi: use correct format characters (git-fixes).
- gpiolib: Never return internal error codes to user space (git-fixes).
- gpiolib: of: fix bounds check for 'gpio-reserved-ranges' (git-fixes).
- gpio: mvebu: drop pwm base assignment (git-fixes).
- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).
- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).
- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).
- gpio: Return EPROBE_DEFER if gc->to_irq is NULL (git-fixes).
- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).
- gpio: sifive: use the correct register to read output values (git-fixes).
- gpio: tegra186: Fix chip_data type confusion (git-fixes).
- gpio: ts4900: Do not set DAT and OE together (git-fixes).
- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gpu: host1x: Fix a memory leak in 'host1x_remove()' (git-fixes).
- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).
- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).
- gve: Fix GFP flags when allocing pages (git-fixes).
- gve: fix the wrong AdminQ buffer queue index check (git-fixes).
- habanalabs: Add check for pci_enable_device (git-fixes).
- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).
- hamradio: fix macro redefine warning (git-fixes).
- hex2bin: fix access beyond string end (git-fixes).
- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).
- HID: add mapping for KEY_DICTATE (git-fixes).
- HID: Add support for open wheel and no attachment to T300 (git-fixes).
- HID:Add support for UGTABLET WP5540 (git-fixes).
- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).
- HID: amd_sfh: Correct the structure field name (git-fixes).
- HID: amd_sfh: Modify the bus name (git-fixes).
- HID: amd_sfh: Modify the hid name (git-fixes).
- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).
- hide appended member supports_dynamic_smps_6ghz (git-fixes).
- HID: elan: Fix potential double free in elan_input_configured (git-fixes).
- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).
- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).
- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).
- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).
- HID: logitech-dj: add new lightspeed receiver id (git-fixes).
- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).
- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).
- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).
- HID: vivaldi: fix sysfs attributes leak (git-fixes).
- hinic: fix bug of wq out of bound access (git-fixes).
- hv_balloon: rate-limit 'Unhandled message' warning (git-fixes).
- hv_netvsc: Add check for kvmalloc_array (git-fixes).
- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).
- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).
- hwmon: (f71882fg) Fix negative temperature (git-fixes).
- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).
- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).
- hwmon: (pmbus) Add Vin unit off handling (git-fixes).
- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).
- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).
- hwmon: (pmbus) disable PEC if not enabled (git-fixes).
- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).
- hwmon: (tmp401) Add OF device ID table (git-fixes).
- hwrng: atmel - disable trng on failure path (git-fixes).
- hwrng: cavium - Check health status while reading random data (git-fixes).
- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).
- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).
- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).
- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).
- i2c: at91: use dma safe buffers (git-fixes).
- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).
- i2c: bcm2835: Fix the error handling in 'bcm2835_i2c_probe()' (git-fixes).
- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).
- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).
- i2c: cadence: Increase timeout per message if necessary (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).
- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).
- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).
- i2c: meson: Fix wrong speed use from probe (git-fixes).
- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).
- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).
- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).
- i2c: npcm: Correct register access width (git-fixes).
- i2c: npcm: Fix timeout calculation (git-fixes).
- i2c: npcm: Handle spurious interrupts (git-fixes).
- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).
- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).
- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).
- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).
- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).
- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).
- i2c: piix4: Move SMBus port selection into function (git-fixes).
- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).
- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).
- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).
- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).
- i2c: xiic: Make bus names unique (git-fixes).
- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- i40e: Fix for failed to init adminq while VF reset (git-fixes).
- i40e: Fix issue when maximum queues is exceeded (git-fixes).
- i40e: Fix queues reservation for XDP (git-fixes).
- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).
- i40e: Fix reset path while removing the driver (git-fixes).
- i40e: fix unsigned stat widths (git-fixes).
- i40e: i40e_main: fix a missing check on list iterator (git-fixes).
- i40e: Increase delay to 1 s after global EMP reset (git-fixes).
- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).
- i40e: respect metadata on XSK Rx to skb (git-fixes).
- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).
- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).
- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).
- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).
- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).
- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).
- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).
- iavf: Fix init state closure on remove (jsc#SLE-18385).
- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).
- iavf: Fix missing check for running netdev (git-fixes).
- iavf: Fix race in init state (jsc#SLE-18385).
- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).
- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).
- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).
- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).
- IB/hfi1: Allow larger MTU without AIP (git-fixes).
- IB/hfi1: Fix AIP early init panic (git-fixes).
- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).
- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).
- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).
- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).
- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).
- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).
- IB/qib: Fix duplicate sysfs directory name (git-fixes).
- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).
- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).
- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).
- ice: check the return of ice_ptp_gettimex64 (git-fixes).
- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).
- ice: Clear default forwarding VSI during VSI release (git-fixes).
- ice: clear stale Tx queue settings before configuring (git-fixes).
- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).
- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- ice: Do not use GFP_KERNEL in atomic context (git-fixes).
- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).
- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).
- ice: fix concurrent reset and removal of VFs (git-fixes).
- ice: fix crash in switchdev mode (jsc#SLE-18375).
- ice: Fix curr_link_speed advertised speed (git-fixes).
- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).
- ice: fix IPIP and SIT TSO offload (git-fixes).
- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).
- ice: fix PTP stale Tx timestamps cleanup (git-fixes).
- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).
- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).
- ice: initialize local variable 'tlv' (git-fixes).
- ice: kabi protect ice_pf (bsc#1200502).
- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).
- ice: respect metadata on XSK Rx to skb (git-fixes).
- ice: synchronize_rcu() when terminating rings (git-fixes).
- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).
- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).
- igb: refactor XDP registration (git-fixes).
- igc: avoid kernel warning when changing RX ring parameters (git-fixes).
- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- igc: Fix BUG: scheduling while atomic (git-fixes).
- igc: Fix infinite loop in release_swfw_sync (git-fixes).
- igc: Fix suspending when PTM is active (jsc#SLE-18377).
- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).
- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).
- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).
- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).
- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).
- iio: adc: ad7124: Remove shift from scan_type (git-fixes).
- iio: adc: Add check for devm_request_threaded_irq (git-fixes).
- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).
- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).
- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).
- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).
- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).
- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).
- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).
- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).
- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio: afe: rescale: Fix boolean logic bug (git-fixes).
- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).
- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).
- iio: dac: ad5592r: Fix the missing return value (git-fixes).
- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).
- iio: Fix error handling for PM (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).
- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).
- iio:imu:bmi160: disable regulator in error path (git-fixes).
- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).
- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).
- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).
- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).
- iio: inkern: make a best effort on offset calculation (git-fixes).
- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).
- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).
- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).
- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).
- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).
- iio: st_sensors: Add a local lock for protecting odr (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).
- ima: Do not print policy rule with inactive LSM labels (git-fixes).
- ima: fix reference leak in asymmetric_verify() (git-fixes).
- ima: Remove ima_policy file before directory (git-fixes).
- init: call time_init() before rand_initialize() (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- init/main.c: return 1 from handled __setup() functions (git-fixes).
- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- Input: add bounds checking to input_set_capability() (git-fixes).
- Input: aiptek - properly check endpoint type (git-fixes).
- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).
- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).
- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).
- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).
- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).
- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).
- Input: ili210x - fix reset timing (git-fixes).
- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).
- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).
- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).
- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).
- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).
- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).
- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).
- Input: synaptics: retry query upon error (bsc#1194086).
- Input: wm97xx: Simplify resource management (git-fixes).
- Input: zinitix - do not report shadow fingers (git-fixes).
- integrity: check the return value of audit_log_start() (git-fixes).
- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).
- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).
- iomap: iomap_write_failed fix (bsc#1200829).
- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).
- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).
- iommu/amd: Remove useless irq affinity notifier (git-fixes).
- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).
- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).
- iommu/amd: X2apic mode: re-enable after resume (git-fixes).
- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).
- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).
- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).
- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).
- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).
- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).
- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).
- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).
- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).
- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).
- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).
- ionic: add FW_STOPPING state (git-fixes).
- ionic: Allow flexibility for error reporting on dev commands (git-fixes).
- ionic: better handling of RESET event (git-fixes).
- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).
- ionic: Cleanups in the Tx hotpath code (git-fixes).
- ionic: Correctly print AQ errors if completions are not received (git-fixes).
- ionic: disable napi when ionic_lif_init() fails (git-fixes).
- ionic: Do not send reset commands if FW isn't running (git-fixes).
- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).
- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).
- ionic: fix up printing of timeout error (git-fixes).
- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).
- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).
- ionic: remove the dbid_inuse bitmap (git-fixes).
- ionic: replace set_vf data with union (git-fixes).
- ionic: start watchdog after all is setup (git-fixes).
- ionic: stretch heartbeat detection (git-fixes).
- io_uring: add more locking annotations for submit (bsc#1199011).
- io_uring: avoid touching inode in rw prep (bsc#1199011).
- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).
- io_uring: cache __io_free_req()'d requests (bsc#1199011).
- io_uring: clean io-wq callbacks (bsc#1199011).
- io_uring: clean up tctx_task_work() (bsc#1199011).
- io_uring: deduplicate open iopoll check (bsc#1199011).
- io_uring: do not halt iopoll too early (bsc#1199011).
- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).
- io_uring: extract a helper for ctx quiesce (bsc#1199011).
- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).
- io_uring: improve ctx hang handling (bsc#1199011).
- io_uring: inline fixed part of io_file_get() (bsc#1199011).
- io_uring: inline io_free_req_deferred (bsc#1199011).
- io_uring: inline io_poll_remove_waitqs (bsc#1199011).
- io_uring: inline struct io_comp_state (bsc#1199011).
- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).
- io_uring: move io_fallback_req_func() (bsc#1199011).
- io_uring: move io_put_task() definition (bsc#1199011).
- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).
- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).
- io_uring: optimise putting task struct (bsc#1199011).
- io_uring: refactor io_alloc_req (bsc#1199011).
- io_uring: remove extra argument for overflow flush (bsc#1199011).
- io_uring: remove file batch-get optimisation (bsc#1199011).
- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).
- io_uring: remove redundant args from cache_free (bsc#1199011).
- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).
- io_uring: rename io_file_supports_async() (bsc#1199011).
- io_uring: run linked timeouts from task_work (bsc#1199011).
- io_uring: run regular file completions from task_work (bsc#1199011).
- io_uring: run timeouts from task_work (bsc#1199011).
- io_uring: use inflight_entry instead of compl.list (bsc#1199011).
- io_uring: use kvmalloc for fixed files (bsc#1199011).
- io-wq: get rid of FIXED worker flag (bsc#1199011).
- io-wq: make worker creation resilient against signals (bsc#1199011).
- io-wq: move nr_running and worker_refs out of wqe->lock protection (bsc#1199011).
- io-wq: only exit on fatal signals (bsc#1199011).
- io-wq: provide a way to limit max number of workers (bsc#1199011).
- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).
- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).
- ipc/sem: do not sleep with a spin lock held (bsc#1198412).
- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).
- ipmi: bail out if init_srcu_struct fails (git-fixes).
- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).
- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).
- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).
- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).
- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).
- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).
- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).
- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).
- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).
- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).
- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).
- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).
- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).
- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).
- irqchip/nvic: Release nvic_base upon failure (git-fixes).
- irqchip/qcom-pdc: Fix broken locking (git-fixes).
- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).
- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).
- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).
- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).
- iwlwifi: do not advertise TWT support (git-fixes).
- iwlwifi: Fix -EIO error code that is never returned (git-fixes).
- iwlwifi: fix use-after-free (git-fixes).
- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).
- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).
- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).
- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).
- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).
- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).
- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).
- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).
- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).
- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).
- iwlwifi: mvm: move only to an enabled channel (git-fixes).
- iwlwifi: pcie: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: pcie: gen2: fix locking when 'HW not ready' (git-fixes).
- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).
- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).
- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).
- ixgbe: respect metadata on XSK Rx to skb (git-fixes).
- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).
- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI: Fix kABI after 'x86/mm/cpa: Generalize __set_memory_enc_pgtable()' (jsc#SLE-19924).
- kABI fix of sysctl_run_estimation (git-fixes).
- kABI: fix rndis_parameters locking (git-fixes).
- kABI: ivtv: restore caps member (git-fixes).
- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)
- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.
- kABI workaround for fxls8962af iio accel drivers (git-fixes).
- kABI workaround for pci quirks (git-fixes).
- kconfig: fix failing to generate auto.conf (git-fixes).
- kconfig: let 'shell' return enough output for deep path names (git-fixes).
- kernel/fork: Initialize mm's PASID (jsc#SLE-24350).
- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).
- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).
- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).
- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).
- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).
- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).
- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).
- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).
- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).
- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).
- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).
- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).
- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).
- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).
- kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe() (bsc#1193277).
- kselftest/arm64: bti: force static linking (git-fixes).
- kunit: tool: Import missing importlib.abc (git-fixes).
- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).
- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).
- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).
- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).
- KVM: Clean up benign vcpu->cpu data races when kicking vCPUs (git-fixes).
- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).
- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).
- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).
- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).
- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).
- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'em (git-fixes).
- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).
- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).
- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).
- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).
- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).
- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).
- KVM: s390: pv: add macros for UVC CC values (git-fixes).
- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).
- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).
- KVM: selftests: Do not skip L2's VMCALL in SMM test for SVM guest (bsc#1194523).
- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).
- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).
- KVM: SEV: do not take kvm->lock when destroying (bsc#1194526).
- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).
- KVM: SEV: Mark nested locking of kvm->lock (bsc#1194526).
- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).
- KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255 (bsc#1193823).
- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).
- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).
- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).
- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).
- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).
- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).
- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).
- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).
- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).
- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).
- KVM: VMX: Read Posted Interrupt 'control' exactly once per loop iteration (git-fixes).
- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).
- KVM: VMX: Remove defunct 'nr_active_uret_msrs' field (git-fixes).
- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).
- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).
- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).
- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).
- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).
- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).
- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).
- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).
- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).
- KVM: x86: Drop WARNs that assert a triple fault never 'escapes' from L2 (git-fixes).
- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).
- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).
- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).
- KVM: x86: Fix emulation in writing cr8 (git-fixes).
- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).
- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).
- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).
- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).
- KVM: x86: Ignore sparse banks size for an 'all CPUs', non-sparse IPI req (git-fixes).
- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).
- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).
- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).
- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).
- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).
- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).
- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).
- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).
- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).
- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).
- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).
- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).
- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).
- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).
- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).
- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).
- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).
- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).
- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).
- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).
- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).
- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).
- KVM: x86: SVM: move avic definitions from AMD's spec to svm.h (bsc#1193823 jsc#SLE-24549).
- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).
- KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSS (git-fixes).
- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).
- lib: bitmap: fix many kernel-doc warnings (git-fixes).
- libbpf: Free up resources used by inner map definition (git-fixes).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (git-fixes).
- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- list: fix a data-race around ep->rdllist (git-fixes).
- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).
- list: test: Add a test for list_is_head() (git-fixes).
- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).
- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).
- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).
- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).
- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).
- locking/rwlocks: introduce write_lock_nested (bsc#1189998).
- LSM: general protection fault in legacy_parse_param (git-fixes).
- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).
- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).
- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).
- mac80211: fix potential double free on mesh join (git-fixes).
- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).
- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).
- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).
- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).
- mac80211: mlme: check for null after calling kmemdup (git-fixes).
- mac80211: refuse aggregations sessions before authorized (git-fixes).
- mac80211: Remove a couple of obsolete TODO (git-fixes).
- mac80211: Reset MBSSID parameters upon connection (git-fixes).
- mac80211: treat some SAE auth steps as final (git-fixes).
- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).
- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 ('rpm: Use bash for %() expansion (jsc#SLE-18234).')
- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).
- mailbox: change mailbox-mpfs compatible string (git-fixes).
- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).
- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).
- mailbox: tegra-hsp: Flush whole channel (git-fixes).
- maple: fix wrong return value of maple_bus_init() (git-fixes).
- md: Do not set mddev private to NULL in raid0 pers->free (git-fixes).
- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).
- md: fix an incorrect NULL check in md_reload_sb (git-fixes).
- md: fix double free of io_acct_set bioset (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- md: Move alloc/free acct bioset in to personality (git-fixes).
- md/raid5: play nice with PREEMPT_RT (bsc#1189998).
- media: aspeed: Correct value for h-total-pixels (git-fixes).
- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).
- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).
- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).
- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).
- media: atomisp: fix bad usage at error handling logic (git-fixes).
- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).
- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).
- media: bttv: fix WARNING regression on tunerless devices (git-fixes).
- media: camss: csid-170: do not enable unused irqs (git-fixes).
- media: camss: csid-170: fix non-10bit formats (git-fixes).
- media: camss: csid-170: remove stray comment (git-fixes).
- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).
- media: camss: vfe-170: fix 'VFE halt timeout' error (git-fixes).
- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).
- media: cec-adap.c: fix is_configuring state (git-fixes).
- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).
- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).
- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).
- media: cx25821: Fix the warning when removing the module (git-fixes).
- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).
- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).
- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).
- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).
- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).
- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).
- media: em28xx: initialize refcount before kref_get (git-fixes).
- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).
- media: hantro: Empty encoder capture buffers by default (git-fixes).
- media: hantro: Fix overfill bottom register field name (git-fixes).
- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).
- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).
- media: hdpvr: initialize dev->worker at hdpvr_register_videodev (git-fixes).
- media: i2c: max9286: fix kernel oops when removing module (git-fixes).
- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).
- media: i2c: max9286: Use 'maxim,gpio-poc' property (git-fixes).
- media: i2c: ov5648: Fix lockdep error (git-fixes).
- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).
- media: imon: reorganize serialization (git-fixes).
- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).
- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).
- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).
- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).
- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).
- media: ir_toy: free before error exiting (git-fixes).
- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).
- media: mexon-ge2d: fixup frames size in registers (git-fixes).
- media: mtk-vcodec: potential dereference of null pointer (git-fixes).
- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).
- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).
- media: ov5648: Do not pack controls struct (git-fixes).
- media: ov6650: Add try support to selection API operations (git-fixes).
- media: ov6650: Fix crop rectangle affected by set format (git-fixes).
- media: ov6650: Fix set format try processing path (git-fixes).
- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).
- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).
- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).
- media: Revert 'media: em28xx: add missing em28xx_close_extension' (git-fixes).
- media: rga: fix possible memory leak in rga_probe (git-fixes).
- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).
- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).
- media: rkvdec: Stop overclocking the decoder (git-fixes).
- media: rockchip/rga: do proper error checking in probe (git-fixes).
- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).
- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).
- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).
- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).
- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).
- media: staging: media: zoran: move videodev alloc (git-fixes).
- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).
- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).
- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).
- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).
- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).
- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).
- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).
- media: venus: hfi: avoid null dereference in deinit (git-fixes).
- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).
- media: videobuf2: Fix the size printk format (git-fixes).
- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).
- media: vidtv: Check for null return of vzalloc (git-fixes).
- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).
- mei: hbm: drop capability response on early shutdown (git-fixes).
- mei: me: add Alder Lake N device id (git-fixes).
- mei: me: add raptor lake point S DID (git-fixes).
- mei: me: disable driver on the ign firmware (git-fixes).
- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).
- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).
- memory: emif: Add check for setup_interrupts (git-fixes).
- memory: emif: check the pointer temp in get_device_details() (git-fixes).
- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).
- memory: mtk-smi: Add error handle for smi_probe (git-fixes).
- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).
- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).
- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).
- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).
- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).
- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).
- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).
- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).
- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).
- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).
- misc: alcor_pci: Fix an error handling path (git-fixes).
- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).
- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).
- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).
- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).
- misc: rtsx: set NULL intfdata when probe fails (git-fixes).
- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).
- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).
- mlx5: kabi protect lag_mp (git-fixes).
- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).
- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)
- mmc: block: Check for errors after write on SPI (git-fixes).
- mmc: block: fix read single on recovery logic (git-fixes).
- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).
- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).
- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).
- mmc: core: Wait for command setting 'Power Off Notification' bit to complete (git-fixes).
- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).
- mm: Change CONFIG option for mm->pasid field (jsc#SLE-24350).
- mmc: host: Return an error when ->enable_sdio_irq() ops is missing (git-fixes).
- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).
- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).
- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).
- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).
- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).
- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).
- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).
- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).
- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).
- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).
- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).
- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).
- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).
- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).
- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).
- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).
- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).
- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).
- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).
- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).
- mm, page_alloc: fix build_zonerefs_node() (git-fixes).
- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).
- mm/slub: add missing TID updates on slab deactivation (git-fixes).
- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).
- mm, thp: lock filemap when truncating page cache (bsc#1198023).
- mm/vmalloc: fix comments about vmap_area struct (git-fixes).
- mm_zone: add function to check if managed dma zone exists (bsc#1197501).
- modpost: fix removing numeric suffixes (git-fixes).
- modpost: fix section mismatch check for exported init/exit sections (git-fixes).
- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).
- modpost: restore the warning message for missing symbol versions (git-fixes).
- Move upstreamed ALSA fix into sorted section
- Move upstreamed x86 patches into sorted section
- mptcp: add missing documented NL params (git-fixes).
- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).
- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).
- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).
- mt76: fix encap offload ethernet type check (git-fixes).
- mt76: fix monitor mode crash with sdio driver (git-fixes).
- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).
- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).
- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).
- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).
- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).
- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).
- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).
- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).
- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).
- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).
- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).
- mt76: mt7921: fix crash when startup fails (git-fixes).
- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).
- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).
- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).
- mtd: mchp23k256: Add SPI ID table (git-fixes).
- mtd: mchp48l640: Add SPI ID table (git-fixes).
- mtd: onenand: Check for error irq (git-fixes).
- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).
- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).
- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).
- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).
- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).
- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).
- mtd: rawnand: denali: Use managed device resources (git-fixes).
- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).
- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).
- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).
- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).
- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).
- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).
- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).
- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).
- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).
- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).
- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).
- n64cart: convert bi_disk to bi_bdev->bd_disk fix build (git-fixes).
- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).
- net: asix: add proper error handling of usb read errors (git-fixes).
- net: atlantic: Avoid out-of-bounds indexing (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: axienet: setup mdio unconditionally (git-fixes).
- net: bnxt_ptp: fix compilation error (bsc#1199736).
- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).
- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).
- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).
- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).
- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).
- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).
- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).
- netfilter: conntrack: move synack init code to helper (bsc#1199035).
- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).
- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).
- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).
- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).
- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).
- net: hns3: add return value for mailbox handling in PF (bsc#1190336).
- net: hns3: add validity check for message data length (git-fixes).
- net: hns3: add vlan list lock to protect vlan list (git-fixes).
- net: hns3: align the debugfs output to the left (git-fixes).
- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).
- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).
- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).
- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).
- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).
- net: hns3: handle empty unknown interrupt for VF (git-fixes).
- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).
- net: hns3: refine the process when PF set VF VLAN (git-fixes).
- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).
- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).
- net/ice: Fix boolean assignment (bsc#1200502).
- net/ice: Remove unused enum (bsc#1200502).
- net: ipa: disable HOLB drop when updating timer (git-fixes).
- net: ipa: HOLB register sometimes must be written twice (git-fixes).
- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).
- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).
- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).
- net: macb: Align the dma and coherent dma masks (git-fixes).
- net: mana: Add counter for packet dropped by XDP (bsc#1195651).
- net: mana: Add counter for XDP_TX (bsc#1195651).
- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).
- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).
- net: mana: Reuse XDP dropped page (bsc#1195651).
- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).
- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).
- net: marvell: prestera: fix double free issue on err path (git-fixes).
- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).
- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).
- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).
- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).
- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).
- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).
- net/mlx5: DR, Cache STE shadow memory (git-fixes).
- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).
- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).
- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).
- net/mlx5e: Add missing increment of count (jsc#SLE-19253).
- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).
- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).
- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).
- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).
- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).
- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).
- net/mlx5e: Fix module EEPROM query (git-fixes).
- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).
- net/mlx5e: Fix trust state reset in reload (git-fixes).
- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).
- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).
- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).
- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).
- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).
- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).
- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).
- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).
- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).
- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).
- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).
- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).
- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).
- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).
- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).
- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).
- net/mlx5: Fix a race on command flush flow (git-fixes).
- net/mlx5: Fix deadlock in sync reset flow (git-fixes).
- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).
- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).
- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).
- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).
- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).
- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).
- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).
- net: mvmdio: fix compilation warning (git-fixes).
- net: netvsc: remove break after return (git-fixes).
- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).
- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).
- net: phy: correct spelling error of media in documentation (git-fixes).
- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).
- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).
- net: phy: Fix race condition on link status change (git-fixes).
- net: phy: marvell10g: fix return value on error (git-fixes).
- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).
- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).
- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).
- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).
- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).
- net: phy: meson-gxl: improve link-up behavior (git-fixes).
- net: phy: micrel: Allow probing without .driver_data (git-fixes).
- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).
- net: phy: micrel: Pass .probe for KS8737 (git-fixes).
- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).
- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).
- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: sfc: add missing xdp queue reinitialization (git-fixes).
- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).
- net: sfc: fix memory leak due to ptp channel (git-fixes).
- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).
- net/smc: Avoid warning of possible recursive locking (git-fixes).
- net/smc: fix connection leak (git-fixes).
- net/smc: fixes for converting from 'struct smc_cdc_tx_pend **' to 'struct smc_wr_tx_pend_priv *' (git-fixes).
- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).
- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).
- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).
- net/smc: postpone sk_refcnt increment in connect() (git-fixes).
- net/smc: remove redundant re-assignment of pointer link (git-fixes).
- net/smc: Remove unused function declaration (git-fixes).
- net/smc: Reset conn->lgr when link group registration fails (git-fixes).
- net/smc: set ini->smcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).
- net/smc: sync err code when tcp connection was refused (git-fixes).
- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).
- net/smc: Transitional solution for clcsock race issue (git-fixes).
- net/smc: Use a mutex for locking 'struct smc_pnettable' (git-fixes).
- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).
- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).
- net: stmmac: Fix signed/unsigned wreckage (git-fixes).
- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).
- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).
- net: usb: asix: do not force pause frames support (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).
- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).
- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).
- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).
- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).
- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).
- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).
- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).
- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).
- nfc: NULL out the dev->rfkill to prevent UAF (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- nfc: pn533: Fix buggy cleanup order (git-fixes).
- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).
- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).
- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).
- nfp: flower: fix ida_idx not being released (git-fixes).
- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).
- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).
- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).
- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).
- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- NFSD: Fix a write performance regression (bsc#1197016).
- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).
- NFSD: Fix nsfd startup race (again) (git-fixes).
- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).
- NFSD: Fix READDIR buffer overflow (git-fixes).
- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).
- NFSD: Fix verifier returned in stable WRITEs (git-fixes).
- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).
- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).
- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).
- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).
- NFS: Do not overfill uncached readdir pages (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report ENOSPC write errors twice (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).
- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (git-fixes).
- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).
- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).
- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).
- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).
- NFS: fix broken handling of the softreval mount option (git-fixes).
- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).
- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).
- NFS: pass cred explicitly for access tests (git-fixes).
- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).
- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).
- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).
- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).
- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).
- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).
- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).
- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).
- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).
- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).
- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).
- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).
- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).
- nl80211: show SSID for P2P_GO interfaces (git-fixes).
- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).
- nl80211: validate S1G channel width (git-fixes).
- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).
- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).
- ntb: intel: fix port config status offset for SPR (git-fixes).
- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).
- nvme: add verbose error logging (bsc#1200567). Update config files.
- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).
- nvme: do not return an error from nvme_configure_metadata (git-fixes).
- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).
- nvme: fix a possible use-after-free in controller reset during load (git-fixes).
- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).
- nvme: send uevent on connection up (jsc#SLE-23643).
- objtool: Add frame-pointer-specific function ignore (bsc#1193277).
- objtool: Fix code relocs vs weak symbols (git-fixes).
- objtool: Fix type of reloc::addend (git-fixes).
- objtool: Ignore unwind hints for ignored functions (bsc#1193277).
- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).
- of: base: Fix phandle argument length mismatch error message (git-fixes).
- of: base: Improve argument length mismatch error (git-fixes).
- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).
- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).
- of: Support more than one crash kernel regions for kexec -s (git-fixes).
- of: unittest: 64 bit dma address test requires arch support (git-fixes).
- of: unittest: fix warning on PowerPC frame size warning (git-fixes).
- of: unittest: update text of expected warnings (git-fixes).
- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config
- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).
- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).
- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).
- PCI: aardvark: Add support for PME interrupts (git-fixes).
- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).
- PCI: aardvark: Clear all MSIs at setup (git-fixes).
- PCI: aardvark: Comment actions in driver remove method (git-fixes).
- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).
- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).
- PCI: aardvark: Disable link training when unbinding driver (git-fixes).
- PCI: aardvark: Do not mask irq when mapping (git-fixes).
- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).
- PCI: aardvark: Enable MSI-X support (git-fixes).
- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).
- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).
- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).
- PCI: aardvark: Fix setting MSI address (git-fixes).
- PCI: aardvark: Fix support for MSI interrupts (git-fixes).
- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).
- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).
- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).
- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).
- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).
- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).
- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).
- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).
- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).
- PCI: aardvark: Update comment about link going down after link-up (git-fixes).
- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev->of_node) (git-fixes).
- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).
- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).
- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).
- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).
- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).
- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).
- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).
- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).
- PCI: endpoint: Fix misused goto label (git-fixes).
- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).
- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).
- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).
- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).
- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).
- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).
- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).
- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).
- PCI: imx6: Fix PERST# start-up sequence (git-fixes).
- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).
- PCI: microchip: Fix potential race in interrupt handling (git-fixes).
- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).
- PCI: mvebu: Fix device enumeration regression (git-fixes).
- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).
- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).
- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).
- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).
- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).
- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).
- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).
- PCI/PM: Power up all devices during runtime resume (git-fixes).
- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).
- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).
- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).
- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).
- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).
- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).
- perf: Copy perf_event_attr::sig_data on modification (git fixes).
- perf/core: Do not pass task around when ctx sched in (git-fixes).
- perf/core: Fix address filter parser for multiple filters (git fixes).
- perf/core: Fix cgroup event list management (git fixes).
- perf/core: Fix perf_cgroup_switch() (git fixes).
- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).
- perf: Fix list corruption in perf_cgroup_switch() (git fixes).
- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).
- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).
- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).
- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).
- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).
- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).
- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).
- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).
- phy: dphy: Correct clk_pre parameter (git-fixes).
- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).
- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).
- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).
- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).
- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).
- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).
- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).
- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).
- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).
- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).
- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).
- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).
- phy: usb: Leave some clocks running during suspend (git-fixes).
- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).
- pinctrl: bcm2835: Fix a few error paths (git-fixes).
- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).
- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).
- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).
- pinctrl: intel: fix unexpected interrupt (git-fixes).
- pinctrl: k210: Fix bias-pull-up (git-fixes).
- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).
- pinctrl: mediatek: moore: Fix build error (git-fixes).
- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).
- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).
- pinctrl: mediatek: paris: Fix 'argument' argument type for mtk_pinconf_get() (git-fixes).
- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).
- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).
- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).
- pinctrl: microchip-sgpio: lock RMW access (git-fixes).
- pinctrl: microchip sgpio: use reset driver (git-fixes).
- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).
- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).
- pinctrl: npcm: Fix broken references to chip->parent_device (git-fixes).
- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).
- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).
- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).
- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).
- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).
- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).
- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).
- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).
- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).
- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).
- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).
- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).
- pinctrl: samsung: drop pin banks references on error paths (git-fixes).
- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).
- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).
- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).
- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).
- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).
- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).
- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).
- pinctrl: tigerlake: Revert 'Add Alder Lake-M ACPI ID' (git-fixes).
- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).
- ping: remove pr_err from ping_lookup (bsc#1195826).
- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).
- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).
- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).
- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).
- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).
- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).
- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).
- platform/surface: surface3-wmi: Simplify resource management (git-fixes).
- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).
- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).
- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).
- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).
- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).
- platform/x86: asus-wmi: Fix 'unsigned 'retval' is never less than zero' smatch warning (bsc#1198058).
- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).
- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).
- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).
- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).
- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).
- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).
- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).
- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).
- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).
- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).
- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).
- platform/x86: panasonic-laptop: revert 'Resolve hotkey double trigger bug' (git-fixes).
- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).
- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).
- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).
- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).
- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).
- PM: domains: Fix initialization of genpd's next_wakeup (git-fixes).
- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).
- PM: hibernate: fix __setup handler error handling (git-fixes).
- PM: hibernate: Remove register_nosave_region_late() (git-fixes).
- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).
- PM: suspend: fix return value of __setup handler (git-fixes).
- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).
- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/64: Move paca allocation later in boot (bsc#1190812).
- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).
- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).
- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).
- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).
- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).
- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).
- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).
- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).
- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).
- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).
- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/lib/sstep: Fix 'sthcx' instruction (bsc#1156395).
- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).
- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).
- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).
- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).
- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).
- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).
- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).
- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).
- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).
- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).
- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).
- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).
- powerpc/xive: Add some error handling code to 'xive_spapr_init()' (git-fixes).
- powerpc/xive: Change the debugfs file 'xive' into a directory (bsc#1194409 ltc#195810).
- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).
- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).
- powerpc/xive: fix return value of __setup handler (bsc#1065729).
- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).
- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).
- powerpc/xive: Rename the 'cpus' debugfs file to 'ipis' (bsc#1194409 ltc#195810).
- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).
- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).
- power: supply: axp20x_battery: properly report current when discharging (git-fixes).
- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).
- power: supply: axp288_fuel_gauge: Drop BIOS version check from 'T3 MRD' DMI quirk (git-fixes).
- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).
- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).
- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).
- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).
- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).
- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).
- printk: Add panic_in_progress helper (bsc#1197894).
- printk: disable optimistic spin during panic (bsc#1197894).
- proc: bootconfig: Add null pointer check (git-fixes).
- proc: fix documentation and description of pagemap (git-fixes).
- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).
- psi: fix 'defined but not used' warnings when (git-fixes)
- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).
- pvpanic: Fix typos in the comments (git-fixes).
- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).
- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).
- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).
- qed: display VF trust config (git-fixes).
- qede: confirm skb is allocated before using (git-fixes).
- qed: fix ethtool register dump (jsc#SLE-19001).
- qed: return status of qed_iov_get_link (git-fixes).
- qla2xxx: add ->map_queues support for nvme (bsc#1195823).
- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).
- raid5: introduce MD_BROKEN (git-fixes).
- random: check for signal_pending() outside of need_resched() check (git-fixes).
- random: wake up /dev/random writers after zap (git-fixes).
- random: wire up fops->splice_{read,write}_iter() (git-fixes).
- ray_cs: Check ioremap return value (git-fixes).
- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).
- RDMA/cma: Use correct address when leaving multicast group (git-fixes).
- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).
- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).
- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).
- RDMA/ib_srp: Fix a deadlock (git-fixes).
- RDMA/irdma: Fix netdev notifications for vlan's (git-fixes).
- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).
- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).
- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).
- RDMA/irdma: Prevent some integer underflows (git-fixes).
- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).
- RDMA/irdma: Remove incorrect masking of PD (git-fixes).
- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).
- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).
- RDMA/mlx5: Add a missing update of cache->last_add (git-fixes).
- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).
- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).
- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).
- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).
- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).
- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).
- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).
- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).
- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).
- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).
- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).
- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).
- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).
- regmap-irq: Update interrupt clear register for proper reset (git-fixes).
- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).
- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).
- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).
- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).
- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).
- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).
- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).
- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).
- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).
- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).
- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).
- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).
- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).
- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).
- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).
- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).
- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).
- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).
- Revert 'drm/amd/display: Fix DCN3 B0 DP Alt Mapping' (git-fixes).
- Revert 'svm: Add warning message for AVIC IPI invalid target' (git-fixes).
- rfkill: make new event layout opt-in (git-fixes).
- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).
- riscv: Fix fill_callchain return value (git fixes).
- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).
- rpmsg: qcom_smd: Fix redundant channel->registered assignment (git-fixes).
- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).
- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).
- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).
- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).
- rtc: check if __rtc_read_time was successful (git-fixes).
- rtc: fix use-after-free on device removal (git-fixes).
- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).
- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).
- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).
- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).
- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).
- rtc: mxc: Silence a clang warning (git-fixes).
- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).
- rtc: pl031: fix rtc features null pointer dereference (git-fixes).
- rtc: sun6i: Fix time overflow handling (git-fixes).
- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).
- rtl818x: Prevent using not initialized queues (git-fixes).
- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).
- rtw88: 8821c: fix debugfs rssi value (git-fixes).
- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).
- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).
- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).
- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).
- s390/ctcm: fix potential memory leak (git-fixes).
- s390/ctcm: fix variable dereferenced before check (git-fixes).
- s390-dasd-fix-data-corruption-for-ESE-devices (bsc#1200205 LTC#198456).
- s390/dasd: fix data corruption for ESE devices (git-fixes).
- s390-dasd-Fix-read-for-ESE-with-blksize-4k (bsc#1200211 LTC#198457).
- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).
- s390-dasd-Fix-read-inconsistency-for-ESE-DASD-devices (bsc#1200211 LTC#198457).
- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).
- s390-dasd-prevent-double-format-of-tracks-for-ESE-devices (bsc#1200205 LTC#198456).
- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).
- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).
- s390/extable: fix exception table sorting (git-fixes).
- s390/kexec_file: fix error handling when applying relocations (git-fixes).
- s390/kexec: fix memory leak of ipl report buffer (git-fixes).
- s390/kexec: fix return code handling (git-fixes).
- s390/lcs: fix variable dereferenced before check (git-fixes).
- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).
- s390/module: fix loading modules with a lot of relocations (git-fixes).
- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).
- s390/nmi: handle vector validity failures for KVM guests (git-fixes).
- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).
- s390/setup: avoid reserving memory above identity mapping (git-fixes).
- s390/smp: sort out physical vs virtual pointers usage (git-fixes).
- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).
- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).
- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).
- sched/core: Export pelt_thermal_tp (git-fixes)
- sched/core: Fix forceidle balancing (git-fixes)
- sched/core: Mitigate race (git-fixes)
- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)
- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)
- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)
- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).
- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).
- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).
- sched/fair: Revise comment about lb decision matrix (git-fixes)
- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)
- sched: Fix yet more sched_fork() races (git fixes (sched/core)).
- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)
- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).
- sched/numa: Apply imbalance limitations consistently (bnc#1193431).
- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).
- sched/numa: Initialise numa_migrate_retry (bnc#1193431).
- sched/pasid: Add a kABI workaround (jsc#SLE-24350).
- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)
- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)
- sched/psi: report zeroes for CPU full at the system level (git-fixes)
- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)
- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)
- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)
- sched/sugov: Ignore busy filter when rq is capped by (git-fixes)
- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)
- scripts/faddr2line: Fix overlapping text section failures (git-fixes).
- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).
- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).
- scsi: core: Query VPD size before getting full page (git-fixes).
- scsi: dc395x: Fix a missing check on list iterator (git-fixes).
- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).
- scsi: fnic: Fix a tracing statement (git-fixes).
- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).
- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).
- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).
- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).
- scsi: hisi_sas: Fix some issues related to asd_sas_port-phy_list (bsc#1198802).
- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).
- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).
- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).
- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).
- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).
- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port->phy_list (bsc#1198802).
- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).
- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).
- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).
- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).
- scsi: libsas: Keep host active while processing events (bsc#1198802).
- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).
- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).
- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).
- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).
- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).
- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).
- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).
- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).
- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).
- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).
- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).
- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).
- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).
- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).
- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).
- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).
- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).
- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).
- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).
- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).
- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).
- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).
- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).
- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).
- scsi: lpfc: Fix typos in comments (bsc#1197675).
- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).
- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).
- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).
- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).
- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).
- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).
- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).
- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).
- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).
- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).
- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).
- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).
- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).
- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).
- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).
- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).
- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).
- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).
- scsi: lpfc: Remove unneeded variable (bsc#1200045).
- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).
- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).
- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).
- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).
- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).
- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).
- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).
- scsi: lpfc: Use fc_block_rport() (bsc#1197675).
- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).
- scsi: lpfc: Use kcalloc() (bsc#1197675).
- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).
- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).
- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).
- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).
- scsi: lpfc: Zero SLI4 fcp_cmnd buffer's fcpCntl0 field (bsc#1200045).
- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).
- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).
- scsi: mpt3sas: Page fault in reply q processing (git-fixes).
- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).
- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port->phy_list (bsc#1198802).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: pm8001: Fix abort all task initialization (git-fixes).
- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).
- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).
- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).
- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).
- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).
- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).
- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).
- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).
- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).
- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).
- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).
- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).
- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).
- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).
- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).
- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).
- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).
- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).
- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).
- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).
- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).
- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).
- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).
- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).
- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).
- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).
- scsi: qla2xxx: Fix typos in comments (bsc#1197661).
- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).
- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).
- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).
- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).
- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).
- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).
- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).
- scsi: qla2xxx: Remove a declaration (bsc#1195823).
- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).
- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).
- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).
- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).
- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).
- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).
- scsi: sr: Do not leak information in ioctl (git-fixes).
- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).
- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).
- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).
- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).
- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).
- selftest: KVM: Add open sev dev helper (bsc#1194526).
- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).
- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).
- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).
- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).
- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).
- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).
- selftests: kvm: Remove absent target file (git-fixes).
- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).
- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).
- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).
- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).
- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).
- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).
- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).
- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).
- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).
- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).
- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).
- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).
- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).
- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).
- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).
- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).
- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).
- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).
- serial: imx: fix overrun interrupts in DMA mode (git-fixes).
- serial: meson: acquire port->lock in startup() (git-fixes).
- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).
- serial: pch: do not overwrite xmit->buf[0] by x_char (git-fixes).
- serial: rda-uart: Do not allow CS5-6 (git-fixes).
- serial: samsung_tty: do not unlock port->lock for uart_write_wakeup() (git-fixes).
- serial: sh-sci: Do not allow CS5-6 (git-fixes).
- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).
- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).
- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).
- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).
- serial: txx9: Do not allow CS5-6 (git-fixes).
- sfc: Do not free an empty page_ring (git-fixes).
- sfc: fallback for lack of xdp tx queues (bsc#1196306).
- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).
- sfc: Use swap() instead of open coding it (bsc#1196306).
- sfc: use swap() to make code cleaner (bsc#1196306).
- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).
- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).
- slip: fix macro redefine warning (git-fixes).
- smb3: add mount parm nosparse (bsc#1193629).
- smb3: add trace point for lease not found issue (bsc#1193629).
- smb3: add trace point for oplock not found (bsc#1193629).
- smb3: check for null tcon (bsc#1193629).
- smb3: cleanup and clarify status of tree connections (bsc#1193629).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).
- smb3: fix snapshot mount option (bsc#1193629).
- [smb3] improve error message when mount options conflict with posix (bsc#1193629).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).
- [smb3] move more common protocol header definitions to smbfs_common (bsc#1193629).
- smb3: send NTLMSSP version information (bsc#1193629).
- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).
- smsc911x: allow using IRQ0 (git-fixes).
- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).
- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).
- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).
- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).
- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).
- soc: fsl: qe: Check of ioremap return value (git-fixes).
- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).
- soc: qcom: aoss: Expose send for generic usecase (git-fixes).
- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).
- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).
- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).
- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).
- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).
- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).
- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).
- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).
- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).
- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).
- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).
- sound/oss/dmasound: fix 'dmasound_setup' defined but not used (git-fixes).
- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).
- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).
- soundwire: qcom: adjust autoenumeration timeout (git-fixes).
- speakup-dectlk: Restore pitch setting (git-fixes).
- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).
- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).
- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).
- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).
- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).
- spi: Fix erroneous sgs value with min_t() (git-fixes).
- spi: Fix invalid sgs value (git-fixes).
- spi: Fix Tegra QSPI example (git-fixes).
- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).
- spi: mxic: Fix the transmit path (git-fixes).
- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).
- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).
- spi: rockchip: Fix error in getting num-cs property (git-fixes).
- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).
- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).
- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).
- spi: rockchip: terminate dma transmission when slave abort (git-fixes).
- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).
- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).
- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).
- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).
- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).
- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).
- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).
- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).
- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).
- spi: tegra20: Use of_device_get_match_data() (git-fixes).
- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).
- sr9700: sanity check for packet length (bsc#1196836).
- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).
- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).
- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).
- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).
- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).
- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).
- staging: most: dim2: use device release method (git-fixes).
- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).
- staging: mt7621-dts: fix formatting (git-fixes).
- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).
- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).
- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).
- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).
- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).
- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).
- staging: vc04_services: shut up out-of-range warning (git-fixes).
- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).
- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).
- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).
- staging: vchiq: Move vchiq char driver to its own file (git-fixes).
- staging: vchiq: Refactor vchiq cdev code (git-fixes).
- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).
- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).
- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)
- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).
- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).
- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).
- SUNRPC do not resend a task on an offlined transport (git-fixes).
- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).
- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).
- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).
- SUNRPC: Handle low memory situations in call_status() (git-fixes).
- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).
- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).
- SUNRPC: Trap RDMA segment overflows (git-fixes).
- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).
- supported.conf: add intel_sdsi
- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)
- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)
- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).
- swiotlb: max mapping size takes min align mask into account (bsc#1197303).
- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).
- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).
- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).
- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).
- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).
- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).
- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).
- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).
- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).
- thermal: int340x: Fix attr.show callback prototype (git-fixes).
- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).
- thermal: int340x: Increase bitmap size (git-fixes).
- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).
- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).
- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)
- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)
- timers: Fix warning condition in __run_timers() (git-fixes)
- TOMOYO: fix __setup handlers return values (git-fixes).
- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).
- tools: bpftool: Complete metrics list in 'bpftool prog profile' doc (git-fixes).
- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).
- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).
- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).
- tpm: Fix error handling in async work (git-fixes).
- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).
- tpm: use try_get_ops() in tpm-space.c (git-fixes).
- tps6598x: clear int mask on probe failure (git-fixes).
- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).
- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).
- tracing: Fix potential double free in create_var_ref() (git-fixes).
- tracing: Fix return value of __setup handlers (git-fixes).
- tracing: Fix return value of trace_pid_write() (git-fixes).
- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).
- tracing: Have trace event string test handle zero length strings (git-fixes).
- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).
- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).
- tracing/histogram: Fix sorting on old 'cpu' value (git-fixes).
- tracing/osnoise: Force quiescent states while tracing (git-fixes).
- tracing: Propagate is_signed to expression (git-fixes).
- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).
- tty: Fix a possible resource leak in icom_probe (git-fixes).
- tty: fix deadlock caused by calling printk() under tty_port->lock (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).
- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).
- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).
- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).
- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).
- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).
- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).
- tty: n_gsm: Fix packet data hex dump output (git-fixes).
- tty: n_gsm: fix proper link termination after failed open (git-fixes).
- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).
- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).
- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).
- tty: n_tty: Restore EOF push handling behavior (git-fixes).
- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).
- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).
- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).
- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).
- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).
- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).
- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).
- udmabuf: validate ubuf->pagecount (git-fixes).
- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).
- usb: cdc-wdm: fix reading stuck on device close (git-fixes).
- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).
- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).
- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: dwc2: gadget: do not reset gadget's driver->bus (git-fixes).
- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).
- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).
- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).
- usb: dwc3: Decouple USB 2.0 L1 & L2 events (git-fixes).
- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).
- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).
- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).
- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).
- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).
- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).
- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).
- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).
- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).
- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).
- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).
- usb: dwc3: gadget: Return proper request status (git-fixes).
- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).
- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).
- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).
- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).
- usb: dwc3: omap: fix 'unbalanced disables for smps10_out1' on omap5evm (git-fixes).
- usb: dwc3: pci: Add 'snps,dis_u2_susphy_quirk' for Intel Bay Trail (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).
- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).
- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).
- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).
- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).
- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).
- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).
- usb: ehci: add pci device support for Aspeed platforms (git-fixes).
- usb: ehci-omap: drop unused ehci_read() function (git-fixes).
- usb: f_fs: Fix use-after-free for epfile (git-fixes).
- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).
- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).
- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).
- usb: gadget: f_fs: change ep->ep safe in ffs_epfile_io() (git-fixes).
- usb: gadget: f_fs: change ep->status safe in ffs_epfile_io() (git-fixes).
- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).
- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).
- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).
- usb: gadget: Fix use-after-free bug by not setting udc->dev.driver (git-fixes).
- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).
- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).
- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).
- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).
- usb: gadget: tegra-xudc: Fix control endpoint's definitions (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).
- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).
- usb: gadget: uvc: rename function to be more consistent (git-fixes).
- usb: gadget: validate endpoint index for xilinx udc (git-fixes).
- usb: gadget: validate interface OS descriptor requests (git-fixes).
- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).
- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).
- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).
- usb: isp1760: Fix out-of-bounds array access (git-fixes).
- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).
- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).
- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- usb: new quirk for Dell Gen 2 devices (git-fixes).
- usb: phy: generic: Get the vbus supply (git-fixes).
- usb: quirks: add a Realtek card reader (git-fixes).
- usb: quirks: add STRING quirk for VCOM device (git-fixes).
- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).
- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).
- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).
- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).
- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).
- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).
- usb: serial: io_ti: add Agilent E5805A support (git-fixes).
- usb: serial: option: add Fibocom L610 modem (git-fixes).
- usb: serial: option: add Fibocom MA510 modem (git-fixes).
- usb: serial: option: add Quectel BG95 modem (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- usb: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).
- usb: serial: option: add support for DW5829e (git-fixes).
- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: serial: option: add Telit LE910R1 compositions (git-fixes).
- usb: serial: option: add ZTE MF286D modem (git-fixes).
- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).
- usb: serial: pl2303: add IBM device IDs (git-fixes).
- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).
- usb: serial: pl2303: fix GS type detection (git-fixes).
- usb: serial: pl2303: fix type detection for odd device (git-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).
- usb: serial: simple: add Nokia phone driver (git-fixes).
- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).
- usb: storage: karma: fix rio_karma_init return (git-fixes).
- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).
- usb: typec: mux: Check dev_set_name() return value (git-fixes).
- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).
- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).
- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).
- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).
- usb: typec: ucsi: Fix role swapping (git-fixes).
- usb: ulpi: Call of_node_put correctly (git-fixes).
- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).
- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).
- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).
- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).
- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).
- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).
- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).
- usb: zaurus: support another broken Zaurus (git-fixes).
- vdpasim: allow to enable a vq repeatedly (git-fixes).
- veth: Ensure eth header is in skb's linear part (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).
- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).
- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).
- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).
- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).
- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).
- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).
- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).
- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).
- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).
- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).
- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).
- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).
- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).
- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).
- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).
- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).
- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).
- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).
- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)
- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).
- video: fbdev: w100fb: Reset global state (git-fixes).
- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).
- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).
- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).
- virtio_console: break out of buf poll on remove (git-fixes).
- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).
- virtio: fix virtio transitional ids (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix for skb_over_panic inside big mode (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-net: realign page_to_skb() after merges (git-fixes).
- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).
- vringh: Fix loop descriptors check in the indirect cases (git-fixes).
- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).
- vsprintf: Fix potential unaligned access (bsc#1198379).
- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).
- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).
- vxcan: enable local echo for sent CAN frames (git-fixes).
- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).
- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).
- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).
- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).
- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).
- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).
- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).
- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).
- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).
- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).
- watch_queue: Actually free the watch (git-fixes).
- watch_queue: Fix NULL dereference in error cleanup (git-fixes).
- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).
- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).
- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).
- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).
- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).
- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).
- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).
- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).
- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).
- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).
- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).
- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).
- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).
- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).
- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).
- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).
- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).
- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).
- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).
- x86/kvmclock: Fix Hyper-V Isolated VM boot issue when vCPUs 64 (bsc#1183682).
- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).
- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).
- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).
- x86/module: Fix the paravirt vs alternative order (bsc#1190497).
- x86/pm: Save the MSR validity status at context setup (bsc#1190497).
- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).
- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).
- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).
- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).
- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).
- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).
- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).
- xen/blkfront: fix comment for need_copy (git-fixes).
- xen: fix is_xen_pmu() (git-fixes).
- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).
- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).
- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).
- xfs: drop async cache flushes from CIL commits (bsc#1195669).
- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).
- xhci: Enable runtime PM on second Alderlake controller (git-fixes).
- xhci: fix garbage USBSTS being logged in some cases (git-fixes).
- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).
- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).
- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).
- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).
- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).
- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).
- xhci: re-initialize the HC during resume if HCE was set (git-fixes).
- xhci: stop polling roothubs after shutdown (git-fixes).
- xhci: turn off port power in shutdown (git-fixes).
- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).
- zsmalloc: decouple class actions from zspage works (bsc#1189998).
- zsmalloc: introduce obj_allocated (bsc#1189998).
- zsmalloc: introduce some helper functions (bsc#1189998).
- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).
- zsmalloc: remove zspage isolation for migration (bsc#1189998).
- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).
- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).
- zsmalloc: replace per zpage lock with pool migrate_lock (bsc#1189998).
- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).
Patchnames
SUSE-2022-2615,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2615,openSUSE-SLE-15.4-2022-2615
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).\n- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)\n- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)\n- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)\n- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)\n- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)\n- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)\n- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)\n- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)\n- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)\n- CVE-2022-0264: Fixed a vulnerability in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-1679: Fixed use-after-free in ath9k in ath9k_hif_usb_rx_cb (bsc#1199487).\n- CVE-2022-20132: Fixed several potential out of bounds reads via malicious HID device (bsc#1200619).\n- CVE-2022-1012: Fixed an information leak in net/ipv4/tcp.c (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bnc#1200692).\n- CVE-2022-1998: Fixed use-after-free in fanotify (bnc#1200284).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI/APEI: Limit printable size of BERT table data (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).\n- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).\n- ACPI: PM: Revert \u0027Only mark EC GPE for wakeup on Intel systems\u0027 (git-fixes).\n- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).\n- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).\n- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).\n- ACPI: processor idle: Check for architectural support for LPI (git-fixes).\n- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).\n- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add references to IBM bugs\n- Add various fsctl structs (bsc#1193629).\n- Adjust cifssb maximum read size (bsc#1193629).\n- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).\n- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).\n- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).\n- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).\n- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).\n- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).\n- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).\n- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).\n- ALSA: hda: Fix driver index handling at re-binding (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).\n- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).\n- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).\n- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).\n- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).\n- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).\n- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).\n- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).\n- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).\n- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).\n- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).\n- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Set max DMA segment size (git-fixes).\n- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).\n- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).\n- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).\n- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).\n- ALSA: pcm: Test for \u0027silence\u0027 field in struct \u0027pcm_format_data\u0027 (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).\n- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).\n- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).\n- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).\n- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).\n- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).\n- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).\n- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).\n- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- ALSA: usb-audio: Increase max buffer size (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).\n- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).\n- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).\n- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).\n- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).\n- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).\n- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).\n- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).\n- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).\n- ALSA: wavefront: Proper check of get_user() error (git-fixes).\n- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).\n- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).\n- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).\n- amd/display: set backlight only if required (git-fixes).\n- arch/arm64: Fix topology initialization for core scheduling (git-fixes).\n- arm64: Add Cortex-A510 CPU part definition (git-fixes).\n- arm64: Add part number for Arm Cortex-A78AE (git-fixes).\n- arm64: Add support for user sub-page fault probing (git-fixes)\n- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).\n- arm64: avoid fixmap race condition when create pud mapping (git-fixes).\n- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).\n- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).\n- arm64: defconfig: build imx-sdma as a module (git-fixes).\n- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).\n- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).\n- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).\n- arm64: dts: agilex: use the compatible \u0027intel,socfpga-agilex-hsotg\u0027 (git-fixes).\n- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).\n- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).\n- arm64: dts: broadcom: Fix sata nodename (git-fixes).\n- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)\n- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)\n- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)\n- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).\n- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 \u0026 mmc settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).\n- arm64: dts: imx8mq: fix lcdif port node (git-fixes).\n- arm64: dts: imx8qm: Correct SCU clock controller\u0027s compatible (git-fixes)\n- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).\n- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).\n- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).\n- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).\n- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).\n- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).\n- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson-g12b-odroid-n2: fix typo \u0027dio2133\u0027 (git-fixes).\n- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).\n- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).\n- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).\n- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).\n- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).\n- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).\n- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).\n- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).\n- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).\n- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).\n- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).\n- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).\n- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).\n- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel\u0027s vddio-supply property (git-fixes).\n- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).\n- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).\n- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).\n- arm64: dts: renesas: Fix thermal bindings (git-fixes).\n- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).\n- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).\n- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).\n- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- arm64: dts: ti: j7200-main: Fix \u0027dtbs_check\u0027 serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: j721e-main: Fix \u0027dtbs_check\u0027 in serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).\n- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).\n- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).\n- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).\n- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)\n- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).\n- arm64: fix types in copy_highpage() (git-fixes).\n- arm64: ftrace: consistently handle PLTs (git-fixes).\n- arm64: ftrace: fix branch range checks (git-fixes).\n- arm64: kasan: fix include error in MTE functions (git-fixes).\n- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).\n- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)\n- arm64: mm: Drop \u0027const\u0027 from conditional arm64_dma_phys_limit definition (git-fixes).\n- arm64: mm: fix p?d_leaf() (git-fixes).\n- arm64: module: remove (NOLOAD) from linker script (git-fixes).\n- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).\n- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).\n- arm64: patch_text: Fixup last cpu should be master (git-fixes).\n- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: stackleak: fix current_top_of_stack() (git-fixes).\n- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)\n- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).\n- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).\n- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module\n- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).\n- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).\n- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).\n- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).\n- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).\n- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).\n- ARM: at91: pm: use proper compatible for sama5d2\u0027s rtc (git-fixes).\n- ARM: at91: pm: use proper compatibles for sam9x60\u0027s rtc and rtt (git-fixes).\n- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).\n- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).\n- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).\n- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).\n- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).\n- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).\n- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).\n- ARM: dts: aspeed: Add secure boot controller node (git-fixes).\n- ARM: dts: aspeed: Add video engine to g6 (git-fixes).\n- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).\n- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).\n- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).\n- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).\n- ARM: dts: at91: fix pinctrl phandles (git-fixes).\n- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).\n- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).\n- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).\n- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).\n- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).\n- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).\n- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).\n- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).\n- ARM: dts: BCM5301X: update CRU block description (git-fixes).\n- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).\n- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).\n- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).\n- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).\n- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).\n- ARM: dts: Fix boot regression on Skomer (git-fixes).\n- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).\n- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).\n- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).\n- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).\n- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).\n- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).\n- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).\n- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).\n- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).\n- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).\n- ARM: dts: imx7ulp: Fix \u0027assigned-clocks-parents\u0027 typo (git-fixes).\n- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).\n- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)\n- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).\n- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).\n- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson: Fix the UART compatible strings (git-fixes).\n- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).\n- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).\n- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).\n- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).\n- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).\n- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).\n- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).\n- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).\n- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).\n- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: socfpga: change qspi to \u0027intel,socfpga-qspi\u0027 (git-fixes).\n- ARM: dts: spear1340: Update serial node properties (git-fixes).\n- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).\n- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).\n- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).\n- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).\n- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).\n- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).\n- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).\n- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).\n- ARM: fix build warning in proc-v7-bugs.c (git-fixes).\n- ARM: fix co-processor register typo (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).\n- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).\n- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).\n- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).\n- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).\n- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).\n- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).\n- ARM: mediatek: select arch timer for mt7629 (git-fixes).\n- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).\n- ARM: mmp: Fix failure to remove sram device (git-fixes).\n- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).\n- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).\n- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).\n- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).\n- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).\n- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).\n- ARM: pxa: maybe fix gpio lookup tables (git-fixes).\n- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).\n- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).\n- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).\n- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).\n- ASoC: amd: Fix reference to PCM buffer address (git-fixes).\n- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).\n- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).\n- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).\n- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).\n- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).\n- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).\n- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).\n- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).\n- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).\n- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: fsl: Use dev_err_probe() helper (git-fixes).\n- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).\n- ASoC: intel: skylake: Set max DMA segment size (git-fixes).\n- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).\n- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13\u0027 (git-fixes).\n- ASoC: madera: Add dependencies on MFD (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).\n- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).\n- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).\n- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).\n- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).\n- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).\n- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).\n- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).\n- ASoC: mediatek: use of_device_get_match_data() (git-fixes).\n- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).\n- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).\n- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).\n- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).\n- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).\n- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).\n- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).\n- ASoC: rt5514: Fix event generation for \u0027DSP Voice Wake Up\u0027 control (git-fixes).\n- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).\n- ASoC: samsung: Use dev_err_probe() helper (git-fixes).\n- ASoC: simple-card: fix probe failure on platform component (git-fixes).\n- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).\n- ASoC: soc-compress: Change the check for codec_dai (git-fixes).\n- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).\n- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).\n- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).\n- ASoC: soc-ops: fix error handling (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).\n- ASoC: SOF: hda: Set max DMA segment size (git-fixes).\n- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).\n- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).\n- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).\n- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: tas2770: Insert post reset delay (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).\n- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect (git-fixes).\n- asus-wmi: Add dgpu disable method (bsc#1198058).\n- asus-wmi: Add egpu enable method (bsc#1198058).\n- asus-wmi: Add panel overdrive functionality (bsc#1198058).\n- asus-wmi: Add support for platform_profile (bsc#1198058).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ata: pata_hpt37x: fix PCI clock detection (git-fixes).\n- ata: pata_marvell: Check the \u0027bmdma_addr\u0027 beforing reading (git-fixes).\n- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).\n- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).\n- ath11k: acquire ab-\u003ebase_lock in unassign when finding the peer by addr (git-fixes).\n- ath11k: disable spectral scan during spectral deinit (git-fixes).\n- ath11k: Do not check arvif-\u003eis_started before sending management frames (git-fixes).\n- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).\n- ath11k: mhi: use mhi_sync_power_up() (git-fixes).\n- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).\n- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- ath9k: fix ar9003_get_eepmisc (git-fixes).\n- ath9k: fix QCA9561 PA bias level (git-fixes).\n- ath9k: Fix usage of driver-private space in tx_info (git-fixes).\n- ath9k_htc: fix potential out of bounds access with invalid rxstatus-\u003ers_keyix (git-fixes).\n- ath9k_htc: fix uninit value bugs (git-fixes).\n- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).\n- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).\n- atm: eni: Add check for dma_map_single (git-fixes).\n- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).\n- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).\n- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (git-fixes).\n- audit: improve robustness of the audit queue handling (git-fixes).\n- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).\n- auxdisplay: lcd2s: Fix memory leak in -\u003eremove() (git-fixes).\n- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- b43: Fix assigning negative value to unsigned variable (git-fixes).\n- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).\n- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bfq: Allow current waker to defend against a tentative one (bsc#1195915).\n- bfq: Avoid false marking of bic as stably merged (bsc#1197926).\n- bfq: Avoid merging queues with different parents (bsc#1197926).\n- bfq: Do not let waker requests skip proper accounting (bsc#1184318).\n- bfq: Drop pointless unlock-lock pair (bsc#1197926).\n- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).\n- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).\n- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).\n- bfq: Limit waker detection in time (bsc#1184318).\n- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).\n- bfq: Relax waker detection for shared queues (bsc#1184318).\n- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).\n- bfq: Split shared queues on move between cgroups (bsc#1197926).\n- bfq: Store full bitmap depth in bfq_data (bsc#1184318).\n- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).\n- bfq: Track whether bfq_group is still online (bsc#1197926).\n- bfq: Update cgroup information before merging bio (bsc#1197926).\n- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).\n- bitfield: add explicit inclusions to the example (git-fixes).\n- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).\n- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).\n- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).\n- blk-mq: do not touch -\u003etagset in blk_mq_get_sq_hctx (bsc#1200824).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: fix tag_get wait task can\u0027t be awakened (bsc#1200263).\n- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).\n- blktrace: fix use after free for struct blk_trace (bsc#1198017).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).\n- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).\n- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).\n- block: do not delete queue kobject before its children (bsc#1198019).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).\n- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).\n- block: Fix up kabi after blkcg merge fix (bsc#1198020).\n- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).\n- block: limit request dispatch loop duration (bsc#1198022).\n- block/mq-deadline: Improve request accounting further (bsc#1198009).\n- block: Provide blk_mq_sched_get_icq() (bsc#1184318).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).\n- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).\n- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).\n- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).\n- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).\n- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).\n- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).\n- Bluetooth: Fix the creation of hdev-\u003ename (git-fixes).\n- Bluetooth: Fix use after free in hci_send_acl (git-fixes).\n- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).\n- Bluetooth: hci_serdev: call init_rwsem() before p-\u003eopen() (git-fixes).\n- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).\n- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).\n- Bluetooth: use memset avoid memory leaks (git-fixes).\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).\n- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).\n- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).\n- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).\n- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).\n- bnxt_en: Increase firmware message response DMA wait time (git-fixes).\n- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).\n- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).\n- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).\n- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).\n- bonding: fix data-races around agg_select_timer (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Add check_func_arg_reg_off function (git-fixes).\n- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).\n- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).\n- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Fix kernel address leakage in atomic cmpxchg\u0027s r0 aux reg (git-fixes).\n- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).\n- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).\n- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).\n- bpf: Resolve to prog-\u003eaux-\u003edst_prog-\u003etype only for BPF_PROG_TYPE_EXT (git-fixes).\n- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#927455 bsc#1198585).\n- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).\n- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).\n- bpftool: Fix memory leak in prog_dump() (git-fixes).\n- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).\n- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).\n- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).\n- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).\n- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).\n- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).\n- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).\n- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).\n- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).\n- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).\n- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).\n- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).\n- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).\n- btrfs: add ro compat flags to inodes (bsc#1197915).\n- btrfs: always update the logged transaction when logging new names (bsc#1197915).\n- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).\n- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).\n- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).\n- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).\n- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)\n- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).\n- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).\n- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).\n- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).\n- btrfs: constify and cleanup variables in comparators (bsc#1197915).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).\n- btrfs: do not pin logs too early during renames (bsc#1197915).\n- btrfs: drop the _nr from the item helpers (bsc#1197915).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).\n- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).\n- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).\n- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).\n- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).\n- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).\n- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).\n- btrfs: improve the batch insertion of delayed items (bsc#1197915).\n- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).\n- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).\n- btrfs: introduce item_nr token variant helpers (bsc#1197915).\n- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).\n- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).\n- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).\n- btrfs: only copy dir index keys when logging a directory (bsc#1197915).\n- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).\n- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).\n- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).\n- btrfs: remove root argument from add_link() (bsc#1197915).\n- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).\n- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).\n- btrfs: remove root argument from check_item_in_log() (bsc#1197915).\n- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).\n- btrfs: remove the btrfs_item_end() helper (bsc#1197915).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).\n- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).\n- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).\n- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).\n- btrfs: unexport setup_items_for_insert() (bsc#1197915).\n- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).\n- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).\n- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).\n- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots \u003e nritems (bsc#1197915).\n- btrfs: use single bulk copy operations when logging directories (bsc#1197915).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).\n- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).\n- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: etas_es58x: change opened_channel_cnt\u0027s type from atomic_t to u8 (git-fixes).\n- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).\n- can: grcan: grcan_close(): fix deadlock (git-fixes).\n- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).\n- can: grcan: only use the NAPI poll budget for RX (git-fixes).\n- can: grcan: use ofdev-\u003edev when allocating DMA memory (git-fixes).\n- can: gs_usb: change active_channels\u0027s type from atomic_t to u8 (git-fixes).\n- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).\n- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).\n- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).\n- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).\n- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).\n- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).\n- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).\n- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).\n- can: mcp251xfd: silence clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: xilinx_can: mark bit timing constants as const (git-fixes).\n- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).\n- carl9170: tx: fix an incorrect use of list iterator (git-fixes).\n- CDC-NCM: avoid overflow in sanity checking (git-fixes).\n- ceph: fix setting of xattrs on async created inodes (bsc#1199611).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).\n- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).\n- cfg80211: fix race in netlink owner interface destruction (git-fixes).\n- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).\n- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).\n- cgroup/cpuset: Fix \u0027suspicious RCU usage\u0027 lockdep warning (bsc#1196868).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).\n- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).\n- cifs: avoid parallel session setups on same channel (bsc#1193629).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).\n- cifs: call helper functions for marking channels for reconnect (bsc#1193629).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).\n- cifs: check for smb1 in open_cached_dir() (bsc#1193629).\n- cifs: check reconnects for channels of active tcons too (bsc#1193629).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).\n- cifs: clean up an inconsistent indenting (bsc#1193629).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).\n- cifs: fix bad fids sent over wire (bsc#1197157).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).\n- cifs: fix handlecache and multiuser (bsc#1193629).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).\n- cifs: fix minor compile warning (bsc#1193629).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).\n- cifs: fix potential deadlock in direct reclaim (bsc#1193629).\n- cifs: fix potential double free during failed mount (bsc#1193629).\n- cifs: fix potential race with cifsd thread (bsc#1193629).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).\n- cifs: fix the connection state transitions with multichannel (bsc#1193629).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).\n- cifs: fix workstation_name for multiuser mounts (bsc#1193629).\n- cifs: force new session setup and tcon for dfs (bsc#1193629).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).\n- cifs: make status checks in version independent callers (bsc#1193629).\n- cifs: mark sessions for reconnection in helper function (bsc#1193629).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).\n- cifs: move superblock magic defitions to magic.h (bsc#1193629).\n- cifs: potential buffer overflow in handling symlinks (bsc#1193629).\n- cifs: print TIDs as hex (bsc#1193629).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).\n- cifs: release cached dentries only if mount is complete (bsc#1193629).\n- cifs: remove check of list iterator against head past the loop body (bsc#1193629).\n- cifs: remove redundant assignment to pointer p (bsc#1193629).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).\n- cifs: remove repeated state change in dfs tree connect (bsc#1193629).\n- cifs: remove unused variable ses_selected (bsc#1193629).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).\n- cifs: return the more nuanced writeback error on close() (bsc#1193629).\n- cifs: serialize all mount attempts (bsc#1193629).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).\n- cifs: skip trailing separators of prefix paths (bsc#1193629).\n- cifs: smbd: fix typo in comment (bsc#1193629).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).\n- cifs: use new enum for ses_status (bsc#1193629).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).\n- cifs: writeback fix (bsc#1193629).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: at91: generated: consider range when calculating best rate (git-fixes).\n- clk: at91: sama7g5: fix parents of PDMCs\u0027 GCLK (git-fixes).\n- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: Enforce that disjoints limits are invalid (git-fixes).\n- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).\n- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: imx8mp: fix usb_root_clk parent (git-fixes).\n- clk: imx: Add check for kcalloc (git-fixes).\n- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).\n- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).\n- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).\n- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).\n- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).\n- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).\n- clk: tegra: Add missing reset deassertion (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).\n- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).\n- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).\n- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).\n- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).\n- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).\n- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).\n- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).\n- copy_process(): Move fd_install() out of sighand-\u003esiglock critical section (bsc#1199626).\n- cpufreq-fix-memory-leak-in-sun50i_cpufreq_nvmem_prob.patch: (git-fixes).\n- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).\n- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).\n- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).\n- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- crypto: amlogic - call finalize with bh disabled (git-fixes).\n- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).\n- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).\n- crypto: ccree - use fine grained DMA mapping dir (git-fixes).\n- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).\n- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).\n- crypto: engine - check if BH is disabled during completion (git-fixes).\n- crypto: gemini - call finalize with bh disabled (git-fixes).\n- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).\n- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).\n- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).\n- crypto: marvell/cesa - ECB does not IV (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).\n- crypto: qat - disable registration of algorithms (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).\n- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).\n- crypto: rockchip - ECB does not need IV (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).\n- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - handle zero sized sg (git-fixes).\n- crypto: sun8i-ss - really disable hash on A80 (git-fixes).\n- crypto: sun8i-ss - rework handling of IV (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).\n- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).\n- crypto: xts - Add softdep on ecb (git-fixes).\n- dax: fix cache flush on PMD-mapped pages (bsc#1200830).\n- devlink: Add \u0027enable_iwarp\u0027 generic device param (bsc#1200502).\n- dim: initialize all struct fields (git-fixes).\n- display/amd: decrease message verbosity about watermarks table failure (git-fixes).\n- dma: at_xdmac: fix a missing check on list iterator (git-fixes).\n- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- dma-debug: fix return value of __setup handlers (git-fixes).\n- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).\n- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).\n- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).\n- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).\n- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).\n- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).\n- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).\n- dmaengine: idxd: fix device cleanup on disable (git-fixes).\n- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).\n- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).\n- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).\n- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).\n- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).\n- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).\n- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).\n- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).\n- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).\n- dmaengine: Revert \u0027dmaengine: shdma: Fix runtime PM imbalance on error\u0027 (git-fixes).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).\n- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).\n- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).\n- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).\n- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).\n- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).\n- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).\n- doc/ip-sysctl: add bc_forwarding (git-fixes).\n- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).\n- Documentation: add link to stable release candidate tree (git-fixes).\n- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).\n- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).\n- Documentation: update stable tree link (git-fixes).\n- do not call utsname() after -\u003ensproxy is NULL (bsc#1201196).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).\n- driver base: fix compaction sysfs file leak (git-fixes).\n- driver: base: fix UAF when driver_attach failed (git-fixes).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- driver core: fix deadlock in __device_attach (git-fixes).\n- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).\n- driver core: Free DMA range map when device is released (git-fixes).\n- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).\n- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).\n- driver: hv: Rename \u0027alloced\u0027 to \u0027allocated\u0027 (git-fixes).\n- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).\n- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).\n- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).\n- driver: net: xgene: Fix regression in CRC stripping (git-fixes).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).\n- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).\n- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).\n- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).\n- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).\n- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).\n- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: Add orientation quirk for GPD Win Max (git-fixes).\n- drm/amd: Add USBC connector ID (git-fixes).\n- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).\n- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).\n- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).\n- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).\n- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).\n- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).\n- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).\n- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).\n- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).\n- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).\n- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).\n- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).\n- drm/amd/display: Enable power gating before init_pipes (git-fixes).\n- drm/amd/display: FEC check in timing validation (git-fixes).\n- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).\n- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).\n- drm/amd/display: fix audio format not updated after edid updated (git-fixes).\n- drm/amd/display: Fix memory leak (git-fixes).\n- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)\n- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).\n- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).\n- drm/amd/display: fix yellow carp wm clamping (git-fixes).\n- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15\u0027 Apple Retina panels (git-fixes).\n- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).\n- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).\n- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).\n- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).\n- drm/amd/display: Revert FEC check in validation (git-fixes).\n- drm/amd/display: Update VTEM Infopacket definition (git-fixes).\n- drm/amd/display: Update watermark values for DCN301 (git-fixes).\n- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).\n- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).\n- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).\n- drm/amdgpu: add beige goby PCI ID (git-fixes).\n- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).\n- drm/amdgpu: check vm ready by amdgpu_vm-\u003eevicting flag (git-fixes).\n- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).\n- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/amdgpu/display: add support for multiple backlights (git-fixes).\n- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).\n- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).\n- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).\n- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).\n- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).\n- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).\n- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).\n- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).\n- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).\n- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).\n- drm/amdgpu: Fix recursive locking warning (git-fixes).\n- drm/amdgpu: fix suspend/resume hang regression (git-fixes).\n- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).\n- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).\n- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).\n- drm/amdgpu: suppress the warning about enum value \u0027AMD_IP_BLOCK_TYPE_NUM\u0027 (git-fixes).\n- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).\n- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).\n- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).\n- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).\n- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).\n- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)\n- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).\n- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).\n- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).\n- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).\n- drm/amdkfd: Fix GWS queue count (bsc#1190786)\n- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).\n- drm/amdkfd: make CRAT table missing message informational only (git-fixes).\n- drm/amdkfd: remove unused function (git-fixes).\n- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).\n- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).\n- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).\n- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).\n- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).\n- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).\n- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).\n- drm/amd/pm: Fix missing thermal throttler status (git-fixes).\n- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).\n- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).\n- drm/ast: Create threshold values for AST2600 (bsc#1190786)\n- drm/atomic: Do not pollute crtc_state-\u003emode_blob with error pointers (git-fixes).\n- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).\n- drm: avoid circular locks in drm_mode_getconnector (git-fixes).\n- drm/blend: fix typo in the comment (git-fixes).\n- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).\n- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).\n- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).\n- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).\n- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).\n- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).\n- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).\n- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).\n- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)\n- drm: bridge: icn6211: Fix register layout (git-fixes).\n- drm: bridge: it66121: Fix the register page length (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)\n- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).\n- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).\n- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).\n- drm/connector: Fix typo in output format (bsc#1190786)\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/edid: check basic audio support on CEA extension block (git-fixes).\n- drm/edid: Do not clear formats if using deep color (git-fixes).\n- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)\n- drm/edid: fix invalid EDID extension block filtering (git-fixes).\n- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).\n- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).\n- drm/fourcc: fix integer type usage in uapi header (git-fixes).\n- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).\n- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).\n- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).\n- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).\n- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).\n- drm/i915/display: Move DRRS code its own file (git-fixes).\n- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).\n- drm/i915/display: split out dpt out of intel_display.c (git-fixes).\n- drm/i915/dmc: Add MMIO range restrictions (git-fixes).\n- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).\n- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)\n- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)\n- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/i915/gem: add missing else (git-fixes).\n- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).\n- drm/i915: Keep gem ctx-\u003evm alive until the final put (bsc#1190497)\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).\n- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).\n- drm/i915/ttm: ensure we unmap when purging (git-fixes).\n- drm/i915/ttm: tweak priority hint selection (git-fixes).\n- drm/i915: Widen the QGV point mask (git-fixes).\n- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).\n- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).\n- drm: imx: fix compiler warning with gcc-12 (git-fixes).\n- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).\n- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).\n- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).\n- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).\n- drm: mali-dp: potential dereference of null pointer (git-fixes).\n- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)\n- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).\n- drm/mediatek: Fix mtk_cec_mask() (git-fixes).\n- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops-\u003einit fails (git-fixes).\n- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).\n- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).\n- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).\n- drm/msm: add missing include to msm_drv.c (git-fixes).\n- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).\n- drm/msm/disp: check the return value of kzalloc() (git-fixes).\n- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)\n- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).\n- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).\n- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).\n- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).\n- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).\n- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)\n- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).\n- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).\n- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).\n- drm/msm/dp: force link training for display resolution change (git-fixes).\n- drm/msm/dp: Modify prototype of encoder based API (git-fixes).\n- drm/msm/dp: populate connector of struct dp_panel (git-fixes).\n- drm/msm/dp: remove fail safe mode related code (git-fixes).\n- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).\n- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)\n- drm/msm/dp: stop link training after link training 2 failed (git-fixes).\n- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).\n- drm/msm/dpu: fix dp audio condition (git-fixes).\n- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)\n- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).\n- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).\n- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).\n- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).\n- drm/msm/dsi: Use \u0027ref\u0027 fw clock instead of global name for VCO parent (git-fixes).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).\n- drm/msm: Fix range size vs end confusion (git-fixes).\n- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).\n- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/msm/mdp5: check the return of kzalloc() (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).\n- drm/msm: properly add and remove internal bridges (bsc#1190768)\n- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)\n- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).\n- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).\n- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).\n- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).\n- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).\n- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).\n- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).\n- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/panfrost: Check for error num after setting mask (git-fixes).\n- drm/plane: Move range check for format_count earlier (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).\n- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).\n- drm/simpledrm: Add \u0027panel orientation\u0027 property on non-upright mounted LCD panels (git-fixes).\n- drm: sti: do not use kernel-doc markers (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)\n- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).\n- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).\n- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).\n- drm: use the lookup lock in drm_is_current_master (git-fixes).\n- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).\n- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).\n- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).\n- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).\n- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).\n- drm/vc4: hvs: Fix frame count register readout (git-fixes).\n- drm/vc4: hvs: Reset muxes at probe time (git-fixes).\n- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).\n- drm/vc4: txp: Force alpha to be 0xff if it\u0027s disabled (git-fixes).\n- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).\n- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).\n- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).\n- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).\n- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).\n- drm/vmwgfx: Remove unused compile options (bsc#1190786)\n- drm/vmwgfx: validate the screen formats (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).\n- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).\n- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).\n- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).\n- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).\n- dt-bindings: net: xgmac_mdio: Remove unsupported \u0027bus-frequency\u0027 (git-fixes).\n- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).\n- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).\n- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).\n- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).\n- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).\n- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).\n- dt-bindings: usb: hcd: correct usb-device path (git-fixes).\n- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).\n- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).\n- e1000e: Correct NVM checksum verification flow (bsc#1191663).\n- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).\n- e1000e: Fix possible overflow in LTR decoding (git-fixes).\n- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).\n- e1000e: Separate ADP board type from TGP (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1190497).\n- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).\n- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).\n- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).\n- EDAC/xgene: Fix deferred probing (bsc#1190497).\n- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).\n- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).\n- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).\n- efi: fix return value of __setup handlers (git-fixes).\n- efivars: Respect \u0027block\u0027 flag in efivar_entry_set_safe() (git-fixes).\n- enable DRM_BOCHS as module (bsc#1200572)\n- epic100: fix use after free on rmmod (git-fixes).\n- ethernet/sfc: remove redundant rc variable (bsc#1196306).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext2: correct max file size computing (bsc#1197820).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix ext4_fc_stats trace point (git-fixes).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- ext4: reject the \u0027commit\u0027 option on ext2 filesystems (bsc#1200808).\n- extcon: Modify extcon device to be created after driver data is set (git-fixes).\n- extcon: ptn5150: Add queue work sync before driver release (git-fixes).\n- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).\n- fbcon: Avoid \u0027cap\u0027 set but not used warning (bsc#1190786)\n- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).\n- firewire: core: extend card-\u003elock in fw_core_handle_bus_reset (git-fixes).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).\n- firewire: remove check of list iterator against head past the loop body (git-fixes).\n- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).\n- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).\n- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).\n- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).\n- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).\n- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).\n- firmware: sysfb: fix platform-device leak in error path (git-fixes).\n- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).\n- firmware: use kernel credentials when reading firmware (git-fixes).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1193629).\n- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).\n- fs: fix fd table size alignment properly (bsc#1200882).\n- fs: handle circular mappings correctly (bsc#1197918).\n- fsl_lpuart: Do not enable interrupts too early (git-fixes).\n- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).\n- fsnotify: fix wrong lockdep annotations (bsc#1200815).\n- ftrace: Clean up hash direct_functions on register failures (git-fixes).\n- fuse: fix fileattr op failure (bsc#1197292).\n- gen_init_cpio: fix short read file handling (bsc#1193289).\n- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)\n- genirq: Synchronize interrupt thread startup (git-fixes)\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gma500: fix an incorrect NULL check on list iterator (git-fixes).\n- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).\n- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).\n- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).\n- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpiolib: acpi: use correct format characters (git-fixes).\n- gpiolib: Never return internal error codes to user space (git-fixes).\n- gpiolib: of: fix bounds check for \u0027gpio-reserved-ranges\u0027 (git-fixes).\n- gpio: mvebu: drop pwm base assignment (git-fixes).\n- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).\n- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).\n- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).\n- gpio: Return EPROBE_DEFER if gc-\u003eto_irq is NULL (git-fixes).\n- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).\n- gpio: sifive: use the correct register to read output values (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027 (git-fixes).\n- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).\n- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: fix the wrong AdminQ buffer queue index check (git-fixes).\n- habanalabs: Add check for pci_enable_device (git-fixes).\n- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- hex2bin: fix access beyond string end (git-fixes).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- HID: Add support for open wheel and no attachment to T300 (git-fixes).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).\n- HID: amd_sfh: Correct the structure field name (git-fixes).\n- HID: amd_sfh: Modify the bus name (git-fixes).\n- HID: amd_sfh: Modify the hid name (git-fixes).\n- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).\n- hide appended member supports_dynamic_smps_6ghz (git-fixes).\n- HID: elan: Fix potential double free in elan_input_configured (git-fixes).\n- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).\n- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).\n- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).\n- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).\n- HID: logitech-dj: add new lightspeed receiver id (git-fixes).\n- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).\n- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- HID: vivaldi: fix sysfs attributes leak (git-fixes).\n- hinic: fix bug of wq out of bound access (git-fixes).\n- hv_balloon: rate-limit \u0027Unhandled message\u0027 warning (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).\n- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).\n- hwmon: (f71882fg) Fix negative temperature (git-fixes).\n- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).\n- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).\n- hwmon: (pmbus) disable PEC if not enabled (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwmon: (tmp401) Add OF device ID table (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - Check health status while reading random data (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).\n- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).\n- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).\n- i2c: at91: use dma safe buffers (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- i2c: bcm2835: Fix the error handling in \u0027bcm2835_i2c_probe()\u0027 (git-fixes).\n- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i2c: cadence: Increase timeout per message if necessary (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).\n- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).\n- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).\n- i2c: meson: Fix wrong speed use from probe (git-fixes).\n- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).\n- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).\n- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).\n- i2c: npcm: Correct register access width (git-fixes).\n- i2c: npcm: Fix timeout calculation (git-fixes).\n- i2c: npcm: Handle spurious interrupts (git-fixes).\n- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).\n- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).\n- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).\n- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).\n- i2c: piix4: Move SMBus port selection into function (git-fixes).\n- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).\n- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).\n- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).\n- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).\n- i2c: xiic: Make bus names unique (git-fixes).\n- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40e: i40e_main: fix a missing check on list iterator (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).\n- i40e: respect metadata on XSK Rx to skb (git-fixes).\n- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).\n- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).\n- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).\n- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).\n- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).\n- iavf: Fix init state closure on remove (jsc#SLE-18385).\n- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).\n- iavf: Fix missing check for running netdev (git-fixes).\n- iavf: Fix race in init state (jsc#SLE-18385).\n- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).\n- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).\n- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).\n- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).\n- IB/hfi1: Allow larger MTU without AIP (git-fixes).\n- IB/hfi1: Fix AIP early init panic (git-fixes).\n- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).\n- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).\n- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).\n- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- IB/qib: Fix duplicate sysfs directory name (git-fixes).\n- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).\n- ice: check the return of ice_ptp_gettimex64 (git-fixes).\n- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).\n- ice: Clear default forwarding VSI during VSI release (git-fixes).\n- ice: clear stale Tx queue settings before configuring (git-fixes).\n- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).\n- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ice: Do not use GFP_KERNEL in atomic context (git-fixes).\n- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).\n- ice: fix concurrent reset and removal of VFs (git-fixes).\n- ice: fix crash in switchdev mode (jsc#SLE-18375).\n- ice: Fix curr_link_speed advertised speed (git-fixes).\n- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).\n- ice: fix PTP stale Tx timestamps cleanup (git-fixes).\n- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).\n- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).\n- ice: initialize local variable \u0027tlv\u0027 (git-fixes).\n- ice: kabi protect ice_pf (bsc#1200502).\n- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: respect metadata on XSK Rx to skb (git-fixes).\n- ice: synchronize_rcu() when terminating rings (git-fixes).\n- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).\n- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).\n- igb: refactor XDP registration (git-fixes).\n- igc: avoid kernel warning when changing RX ring parameters (git-fixes).\n- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- igc: Fix BUG: scheduling while atomic (git-fixes).\n- igc: Fix infinite loop in release_swfw_sync (git-fixes).\n- igc: Fix suspending when PTM is active (jsc#SLE-18377).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).\n- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).\n- iio: adc: ad7124: Remove shift from scan_type (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).\n- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).\n- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).\n- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).\n- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).\n- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).\n- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).\n- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio: afe: rescale: Fix boolean logic bug (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).\n- iio: dac: ad5592r: Fix the missing return value (git-fixes).\n- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).\n- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).\n- iio:imu:bmi160: disable regulator in error path (git-fixes).\n- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).\n- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).\n- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).\n- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).\n- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).\n- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).\n- iio: st_sensors: Add a local lock for protecting odr (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: fix reference leak in asymmetric_verify() (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- init: call time_init() before rand_initialize() (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- init/main.c: return 1 from handled __setup() functions (git-fixes).\n- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: add bounds checking to input_set_capability() (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).\n- Input: ili210x - fix reset timing (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).\n- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).\n- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).\n- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).\n- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).\n- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).\n- Input: synaptics: retry query upon error (bsc#1194086).\n- Input: wm97xx: Simplify resource management (git-fixes).\n- Input: zinitix - do not report shadow fingers (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).\n- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).\n- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).\n- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).\n- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).\n- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- ionic: add FW_STOPPING state (git-fixes).\n- ionic: Allow flexibility for error reporting on dev commands (git-fixes).\n- ionic: better handling of RESET event (git-fixes).\n- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).\n- ionic: Cleanups in the Tx hotpath code (git-fixes).\n- ionic: Correctly print AQ errors if completions are not received (git-fixes).\n- ionic: disable napi when ionic_lif_init() fails (git-fixes).\n- ionic: Do not send reset commands if FW isn\u0027t running (git-fixes).\n- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).\n- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).\n- ionic: fix up printing of timeout error (git-fixes).\n- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).\n- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).\n- ionic: remove the dbid_inuse bitmap (git-fixes).\n- ionic: replace set_vf data with union (git-fixes).\n- ionic: start watchdog after all is setup (git-fixes).\n- ionic: stretch heartbeat detection (git-fixes).\n- io_uring: add more locking annotations for submit (bsc#1199011).\n- io_uring: avoid touching inode in rw prep (bsc#1199011).\n- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).\n- io_uring: cache __io_free_req()\u0027d requests (bsc#1199011).\n- io_uring: clean io-wq callbacks (bsc#1199011).\n- io_uring: clean up tctx_task_work() (bsc#1199011).\n- io_uring: deduplicate open iopoll check (bsc#1199011).\n- io_uring: do not halt iopoll too early (bsc#1199011).\n- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).\n- io_uring: extract a helper for ctx quiesce (bsc#1199011).\n- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).\n- io_uring: improve ctx hang handling (bsc#1199011).\n- io_uring: inline fixed part of io_file_get() (bsc#1199011).\n- io_uring: inline io_free_req_deferred (bsc#1199011).\n- io_uring: inline io_poll_remove_waitqs (bsc#1199011).\n- io_uring: inline struct io_comp_state (bsc#1199011).\n- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).\n- io_uring: move io_fallback_req_func() (bsc#1199011).\n- io_uring: move io_put_task() definition (bsc#1199011).\n- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).\n- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).\n- io_uring: optimise putting task struct (bsc#1199011).\n- io_uring: refactor io_alloc_req (bsc#1199011).\n- io_uring: remove extra argument for overflow flush (bsc#1199011).\n- io_uring: remove file batch-get optimisation (bsc#1199011).\n- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).\n- io_uring: remove redundant args from cache_free (bsc#1199011).\n- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).\n- io_uring: rename io_file_supports_async() (bsc#1199011).\n- io_uring: run linked timeouts from task_work (bsc#1199011).\n- io_uring: run regular file completions from task_work (bsc#1199011).\n- io_uring: run timeouts from task_work (bsc#1199011).\n- io_uring: use inflight_entry instead of compl.list (bsc#1199011).\n- io_uring: use kvmalloc for fixed files (bsc#1199011).\n- io-wq: get rid of FIXED worker flag (bsc#1199011).\n- io-wq: make worker creation resilient against signals (bsc#1199011).\n- io-wq: move nr_running and worker_refs out of wqe-\u003elock protection (bsc#1199011).\n- io-wq: only exit on fatal signals (bsc#1199011).\n- io-wq: provide a way to limit max number of workers (bsc#1199011).\n- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).\n- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).\n- ipc/sem: do not sleep with a spin lock held (bsc#1198412).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: bail out if init_srcu_struct fails (git-fixes).\n- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).\n- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).\n- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).\n- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).\n- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).\n- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).\n- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).\n- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).\n- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).\n- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).\n- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).\n- irqchip/nvic: Release nvic_base upon failure (git-fixes).\n- irqchip/qcom-pdc: Fix broken locking (git-fixes).\n- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).\n- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).\n- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).\n- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).\n- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).\n- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).\n- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).\n- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).\n- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).\n- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).\n- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).\n- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).\n- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).\n- iwlwifi: mvm: move only to an enabled channel (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).\n- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).\n- ixgbe: respect metadata on XSK Rx to skb (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI: Fix kABI after \u0027x86/mm/cpa: Generalize __set_memory_enc_pgtable()\u0027 (jsc#SLE-19924).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kABI: fix rndis_parameters locking (git-fixes).\n- kABI: ivtv: restore caps member (git-fixes).\n- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)\n- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.\n- kABI workaround for fxls8962af iio accel drivers (git-fixes).\n- kABI workaround for pci quirks (git-fixes).\n- kconfig: fix failing to generate auto.conf (git-fixes).\n- kconfig: let \u0027shell\u0027 return enough output for deep path names (git-fixes).\n- kernel/fork: Initialize mm\u0027s PASID (jsc#SLE-24350).\n- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).\n- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).\n- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).\n- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).\n- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).\n- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).\n- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).\n- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).\n- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).\n- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).\n- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).\n- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).\n- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).\n- kprobes: treewide: Use \u0027kprobe_opcode_t *\u0027 for the code address in get_optimized_kprobe() (bsc#1193277).\n- kselftest/arm64: bti: force static linking (git-fixes).\n- kunit: tool: Import missing importlib.abc (git-fixes).\n- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).\n- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).\n- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).\n- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).\n- KVM: Clean up benign vcpu-\u003ecpu data races when kicking vCPUs (git-fixes).\n- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).\n- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).\n- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).\n- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).\n- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).\n- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants \u0027em (git-fixes).\n- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).\n- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).\n- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).\n- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).\n- KVM: s390: pv: add macros for UVC CC values (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: selftests: Do not skip L2\u0027s VMCALL in SMM test for SVM guest (bsc#1194523).\n- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).\n- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).\n- KVM: SEV: do not take kvm-\u003elock when destroying (bsc#1194526).\n- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).\n- KVM: SEV: Mark nested locking of kvm-\u003elock (bsc#1194526).\n- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).\n- KVM: SVM: Allow AVIC support on system w/ physical APIC ID \u003e 255 (bsc#1193823).\n- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).\n- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).\n- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).\n- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).\n- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).\n- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).\n- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).\n- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).\n- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).\n- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).\n- KVM: VMX: Read Posted Interrupt \u0027control\u0027 exactly once per loop iteration (git-fixes).\n- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).\n- KVM: VMX: Remove defunct \u0027nr_active_uret_msrs\u0027 field (git-fixes).\n- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).\n- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).\n- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).\n- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).\n- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).\n- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).\n- KVM: x86: Drop WARNs that assert a triple fault never \u0027escapes\u0027 from L2 (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).\n- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).\n- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).\n- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).\n- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).\n- KVM: x86: Ignore sparse banks size for an \u0027all CPUs\u0027, non-sparse IPI req (git-fixes).\n- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).\n- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).\n- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).\n- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).\n- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).\n- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).\n- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).\n- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).\n- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).\n- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).\n- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).\n- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).\n- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).\n- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).\n- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).\n- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).\n- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).\n- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).\n- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).\n- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).\n- KVM: x86: SVM: move avic definitions from AMD\u0027s spec to svm.h (bsc#1193823 jsc#SLE-24549).\n- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).\n- KVM: x86: Update vCPU\u0027s runtime CPUID on write to MSR_IA32_XSS (git-fixes).\n- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).\n- lib: bitmap: fix many kernel-doc warnings (git-fixes).\n- libbpf: Free up resources used by inner map definition (git-fixes).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (git-fixes).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).\n- list: test: Add a test for list_is_head() (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).\n- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).\n- locking/rwlocks: introduce write_lock_nested (bsc#1189998).\n- LSM: general protection fault in legacy_parse_param (git-fixes).\n- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).\n- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).\n- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).\n- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).\n- mac80211: mlme: check for null after calling kmemdup (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- mac80211: Remove a couple of obsolete TODO (git-fixes).\n- mac80211: Reset MBSSID parameters upon connection (git-fixes).\n- mac80211: treat some SAE auth steps as final (git-fixes).\n- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).\n- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 (\u0027rpm: Use bash for %() expansion (jsc#SLE-18234).\u0027)\n- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).\n- mailbox: change mailbox-mpfs compatible string (git-fixes).\n- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).\n- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).\n- mailbox: tegra-hsp: Flush whole channel (git-fixes).\n- maple: fix wrong return value of maple_bus_init() (git-fixes).\n- md: Do not set mddev private to NULL in raid0 pers-\u003efree (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md: fix double free of io_acct_set bioset (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- md: Move alloc/free acct bioset in to personality (git-fixes).\n- md/raid5: play nice with PREEMPT_RT (bsc#1189998).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).\n- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).\n- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).\n- media: atomisp: fix bad usage at error handling logic (git-fixes).\n- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).\n- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: camss: csid-170: do not enable unused irqs (git-fixes).\n- media: camss: csid-170: fix non-10bit formats (git-fixes).\n- media: camss: csid-170: remove stray comment (git-fixes).\n- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).\n- media: camss: vfe-170: fix \u0027VFE halt timeout\u0027 error (git-fixes).\n- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).\n- media: cec-adap.c: fix is_configuring state (git-fixes).\n- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).\n- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: cx25821: Fix the warning when removing the module (git-fixes).\n- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).\n- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).\n- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).\n- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).\n- media: hantro: Empty encoder capture buffers by default (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).\n- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).\n- media: hdpvr: initialize dev-\u003eworker at hdpvr_register_videodev (git-fixes).\n- media: i2c: max9286: fix kernel oops when removing module (git-fixes).\n- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).\n- media: i2c: max9286: Use \u0027maxim,gpio-poc\u0027 property (git-fixes).\n- media: i2c: ov5648: Fix lockdep error (git-fixes).\n- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).\n- media: imon: reorganize serialization (git-fixes).\n- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).\n- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).\n- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).\n- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).\n- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).\n- media: ir_toy: free before error exiting (git-fixes).\n- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).\n- media: mexon-ge2d: fixup frames size in registers (git-fixes).\n- media: mtk-vcodec: potential dereference of null pointer (git-fixes).\n- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).\n- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).\n- media: ov5648: Do not pack controls struct (git-fixes).\n- media: ov6650: Add try support to selection API operations (git-fixes).\n- media: ov6650: Fix crop rectangle affected by set format (git-fixes).\n- media: ov6650: Fix set format try processing path (git-fixes).\n- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).\n- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).\n- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).\n- media: Revert \u0027media: em28xx: add missing em28xx_close_extension\u0027 (git-fixes).\n- media: rga: fix possible memory leak in rga_probe (git-fixes).\n- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).\n- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).\n- media: rkvdec: Stop overclocking the decoder (git-fixes).\n- media: rockchip/rga: do proper error checking in probe (git-fixes).\n- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).\n- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).\n- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).\n- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).\n- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).\n- media: staging: media: zoran: move videodev alloc (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).\n- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).\n- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).\n- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).\n- media: venus: hfi: avoid null dereference in deinit (git-fixes).\n- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).\n- media: videobuf2: Fix the size printk format (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- media: vidtv: Check for null return of vzalloc (git-fixes).\n- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).\n- mei: hbm: drop capability response on early shutdown (git-fixes).\n- mei: me: add Alder Lake N device id (git-fixes).\n- mei: me: add raptor lake point S DID (git-fixes).\n- mei: me: disable driver on the ign firmware (git-fixes).\n- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).\n- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).\n- memory: mtk-smi: Add error handle for smi_probe (git-fixes).\n- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).\n- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).\n- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).\n- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).\n- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).\n- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).\n- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).\n- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).\n- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).\n- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).\n- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).\n- misc: rtsx: set NULL intfdata when probe fails (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).\n- mlx5: kabi protect lag_mp (git-fixes).\n- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).\n- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)\n- mmc: block: Check for errors after write on SPI (git-fixes).\n- mmc: block: fix read single on recovery logic (git-fixes).\n- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).\n- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).\n- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).\n- mmc: core: Wait for command setting \u0027Power Off Notification\u0027 bit to complete (git-fixes).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- mm: Change CONFIG option for mm-\u003epasid field (jsc#SLE-24350).\n- mmc: host: Return an error when -\u003eenable_sdio_irq() ops is missing (git-fixes).\n- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).\n- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).\n- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).\n- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).\n- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).\n- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).\n- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).\n- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).\n- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).\n- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).\n- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).\n- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).\n- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).\n- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).\n- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).\n- mm/slub: add missing TID updates on slab deactivation (git-fixes).\n- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).\n- mm, thp: lock filemap when truncating page cache (bsc#1198023).\n- mm/vmalloc: fix comments about vmap_area struct (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- modpost: fix removing numeric suffixes (git-fixes).\n- modpost: fix section mismatch check for exported init/exit sections (git-fixes).\n- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).\n- modpost: restore the warning message for missing symbol versions (git-fixes).\n- Move upstreamed ALSA fix into sorted section\n- Move upstreamed x86 patches into sorted section\n- mptcp: add missing documented NL params (git-fixes).\n- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).\n- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).\n- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).\n- mt76: fix encap offload ethernet type check (git-fixes).\n- mt76: fix monitor mode crash with sdio driver (git-fixes).\n- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).\n- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).\n- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).\n- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).\n- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7921: fix crash when startup fails (git-fixes).\n- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).\n- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).\n- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).\n- mtd: mchp23k256: Add SPI ID table (git-fixes).\n- mtd: mchp48l640: Add SPI ID table (git-fixes).\n- mtd: onenand: Check for error irq (git-fixes).\n- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).\n- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).\n- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).\n- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).\n- mtd: rawnand: denali: Use managed device resources (git-fixes).\n- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).\n- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).\n- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).\n- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).\n- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).\n- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).\n- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).\n- n64cart: convert bi_disk to bi_bdev-\u003ebd_disk fix build (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: atlantic: Avoid out-of-bounds indexing (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: axienet: setup mdio unconditionally (git-fixes).\n- net: bnxt_ptp: fix compilation error (bsc#1199736).\n- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).\n- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).\n- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).\n- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).\n- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).\n- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).\n- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).\n- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).\n- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).\n- net: hns3: add return value for mailbox handling in PF (bsc#1190336).\n- net: hns3: add validity check for message data length (git-fixes).\n- net: hns3: add vlan list lock to protect vlan list (git-fixes).\n- net: hns3: align the debugfs output to the left (git-fixes).\n- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).\n- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).\n- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).\n- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).\n- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).\n- net: hns3: handle empty unknown interrupt for VF (git-fixes).\n- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).\n- net: hns3: refine the process when PF set VF VLAN (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).\n- net/ice: Fix boolean assignment (bsc#1200502).\n- net/ice: Remove unused enum (bsc#1200502).\n- net: ipa: disable HOLB drop when updating timer (git-fixes).\n- net: ipa: HOLB register sometimes must be written twice (git-fixes).\n- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).\n- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).\n- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).\n- net: marvell: prestera: fix double free issue on err path (git-fixes).\n- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).\n- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).\n- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).\n- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).\n- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).\n- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).\n- net/mlx5: DR, Cache STE shadow memory (git-fixes).\n- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).\n- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).\n- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).\n- net/mlx5e: Add missing increment of count (jsc#SLE-19253).\n- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).\n- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).\n- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).\n- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).\n- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).\n- net/mlx5e: Fix module EEPROM query (git-fixes).\n- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).\n- net/mlx5e: Fix trust state reset in reload (git-fixes).\n- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).\n- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).\n- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).\n- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).\n- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).\n- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).\n- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).\n- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).\n- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).\n- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).\n- net/mlx5: Fix a race on command flush flow (git-fixes).\n- net/mlx5: Fix deadlock in sync reset flow (git-fixes).\n- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).\n- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).\n- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).\n- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).\n- net: mvmdio: fix compilation warning (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: correct spelling error of media in documentation (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).\n- net: phy: Fix race condition on link status change (git-fixes).\n- net: phy: marvell10g: fix return value on error (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).\n- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).\n- net: phy: meson-gxl: improve link-up behavior (git-fixes).\n- net: phy: micrel: Allow probing without .driver_data (git-fixes).\n- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).\n- net: phy: micrel: Pass .probe for KS8737 (git-fixes).\n- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).\n- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).\n- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: sfc: add missing xdp queue reinitialization (git-fixes).\n- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).\n- net: sfc: fix memory leak due to ptp channel (git-fixes).\n- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).\n- net/smc: Avoid warning of possible recursive locking (git-fixes).\n- net/smc: fix connection leak (git-fixes).\n- net/smc: fixes for converting from \u0027struct smc_cdc_tx_pend **\u0027 to \u0027struct smc_wr_tx_pend_priv *\u0027 (git-fixes).\n- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).\n- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).\n- net/smc: postpone sk_refcnt increment in connect() (git-fixes).\n- net/smc: remove redundant re-assignment of pointer link (git-fixes).\n- net/smc: Remove unused function declaration (git-fixes).\n- net/smc: Reset conn-\u003elgr when link group registration fails (git-fixes).\n- net/smc: set ini-\u003esmcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).\n- net/smc: sync err code when tcp connection was refused (git-fixes).\n- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).\n- net/smc: Transitional solution for clcsock race issue (git-fixes).\n- net/smc: Use a mutex for locking \u0027struct smc_pnettable\u0027 (git-fixes).\n- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).\n- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).\n- net: stmmac: Fix signed/unsigned wreckage (git-fixes).\n- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).\n- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: asix: do not force pause frames support (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).\n- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).\n- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).\n- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).\n- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).\n- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).\n- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).\n- nfc: NULL out the dev-\u003erfkill to prevent UAF (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- nfc: pn533: Fix buggy cleanup order (git-fixes).\n- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).\n- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nfp: flower: fix ida_idx not being released (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).\n- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- NFSD: Fix a write performance regression (bsc#1197016).\n- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).\n- NFSD: Fix nsfd startup race (again) (git-fixes).\n- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).\n- NFSD: Fix READDIR buffer overflow (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSD: Fix verifier returned in stable WRITEs (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).\n- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not overfill uncached readdir pages (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report ENOSPC write errors twice (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: do not store \u0027struct cred *\u0027 in struct nfs_access_entry (git-fixes).\n- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).\n- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFS: fix broken handling of the softreval mount option (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).\n- NFS: pass cred explicitly for access tests (git-fixes).\n- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).\n- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- nl80211: show SSID for P2P_GO interfaces (git-fixes).\n- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).\n- nl80211: validate S1G channel width (git-fixes).\n- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).\n- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).\n- nvme: add verbose error logging (bsc#1200567). Update config files.\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme: send uevent on connection up (jsc#SLE-23643).\n- objtool: Add frame-pointer-specific function ignore (bsc#1193277).\n- objtool: Fix code relocs vs weak symbols (git-fixes).\n- objtool: Fix type of reloc::addend (git-fixes).\n- objtool: Ignore unwind hints for ignored functions (bsc#1193277).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- of: base: Fix phandle argument length mismatch error message (git-fixes).\n- of: base: Improve argument length mismatch error (git-fixes).\n- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).\n- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).\n- of: Support more than one crash kernel regions for kexec -s (git-fixes).\n- of: unittest: 64 bit dma address test requires arch support (git-fixes).\n- of: unittest: fix warning on PowerPC frame size warning (git-fixes).\n- of: unittest: update text of expected warnings (git-fixes).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).\n- PCI: aardvark: Add support for PME interrupts (git-fixes).\n- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).\n- PCI: aardvark: Clear all MSIs at setup (git-fixes).\n- PCI: aardvark: Comment actions in driver remove method (git-fixes).\n- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).\n- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).\n- PCI: aardvark: Disable link training when unbinding driver (git-fixes).\n- PCI: aardvark: Do not mask irq when mapping (git-fixes).\n- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).\n- PCI: aardvark: Enable MSI-X support (git-fixes).\n- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).\n- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).\n- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).\n- PCI: aardvark: Fix setting MSI address (git-fixes).\n- PCI: aardvark: Fix support for MSI interrupts (git-fixes).\n- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).\n- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).\n- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).\n- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).\n- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).\n- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).\n- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).\n- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).\n- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).\n- PCI: aardvark: Update comment about link going down after link-up (git-fixes).\n- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev-\u003eof_node) (git-fixes).\n- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).\n- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).\n- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).\n- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).\n- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).\n- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).\n- PCI: endpoint: Fix misused goto label (git-fixes).\n- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).\n- PCI: imx6: Fix PERST# start-up sequence (git-fixes).\n- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).\n- PCI: microchip: Fix potential race in interrupt handling (git-fixes).\n- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).\n- PCI: mvebu: Fix device enumeration regression (git-fixes).\n- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).\n- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).\n- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).\n- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).\n- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).\n- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).\n- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).\n- PCI/PM: Power up all devices during runtime resume (git-fixes).\n- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).\n- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).\n- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).\n- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).\n- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).\n- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).\n- perf: Copy perf_event_attr::sig_data on modification (git fixes).\n- perf/core: Do not pass task around when ctx sched in (git-fixes).\n- perf/core: Fix address filter parser for multiple filters (git fixes).\n- perf/core: Fix cgroup event list management (git fixes).\n- perf/core: Fix perf_cgroup_switch() (git fixes).\n- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).\n- perf: Fix list corruption in perf_cgroup_switch() (git fixes).\n- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).\n- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).\n- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).\n- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).\n- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).\n- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).\n- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).\n- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).\n- phy: dphy: Correct clk_pre parameter (git-fixes).\n- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).\n- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).\n- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).\n- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).\n- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).\n- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).\n- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).\n- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).\n- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).\n- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).\n- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).\n- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).\n- phy: usb: Leave some clocks running during suspend (git-fixes).\n- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).\n- pinctrl: bcm2835: Fix a few error paths (git-fixes).\n- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).\n- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- pinctrl: k210: Fix bias-pull-up (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: moore: Fix build error (git-fixes).\n- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).\n- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).\n- pinctrl: mediatek: paris: Fix \u0027argument\u0027 argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).\n- pinctrl: microchip-sgpio: lock RMW access (git-fixes).\n- pinctrl: microchip sgpio: use reset driver (git-fixes).\n- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: npcm: Fix broken references to chip-\u003eparent_device (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).\n- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).\n- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).\n- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).\n- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).\n- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).\n- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).\n- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).\n- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).\n- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).\n- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).\n- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).\n- pinctrl: tigerlake: Revert \u0027Add Alder Lake-M ACPI ID\u0027 (git-fixes).\n- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).\n- ping: remove pr_err from ping_lookup (bsc#1195826).\n- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).\n- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).\n- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).\n- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).\n- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).\n- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).\n- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).\n- platform/surface: surface3-wmi: Simplify resource management (git-fixes).\n- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).\n- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).\n- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).\n- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).\n- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).\n- platform/x86: asus-wmi: Fix \u0027unsigned \u0027retval\u0027 is never less than zero\u0027 smatch warning (bsc#1198058).\n- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).\n- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).\n- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).\n- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).\n- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).\n- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).\n- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).\n- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).\n- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).\n- platform/x86: panasonic-laptop: revert \u0027Resolve hotkey double trigger bug\u0027 (git-fixes).\n- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).\n- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).\n- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).\n- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).\n- PM: domains: Fix initialization of genpd\u0027s next_wakeup (git-fixes).\n- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).\n- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).\n- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).\n- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/lib/sstep: Fix \u0027sthcx\u0027 instruction (bsc#1156395).\n- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).\n- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).\n- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).\n- powerpc/xive: Add some error handling code to \u0027xive_spapr_init()\u0027 (git-fixes).\n- powerpc/xive: Change the debugfs file \u0027xive\u0027 into a directory (bsc#1194409 ltc#195810).\n- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).\n- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).\n- powerpc/xive: Rename the \u0027cpus\u0027 debugfs file to \u0027ipis\u0027 (bsc#1194409 ltc#195810).\n- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).\n- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).\n- power: supply: axp20x_battery: properly report current when discharging (git-fixes).\n- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).\n- power: supply: axp288_fuel_gauge: Drop BIOS version check from \u0027T3 MRD\u0027 DMI quirk (git-fixes).\n- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).\n- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).\n- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).\n- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).\n- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).\n- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- proc: bootconfig: Add null pointer check (git-fixes).\n- proc: fix documentation and description of pagemap (git-fixes).\n- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).\n- psi: fix \u0027defined but not used\u0027 warnings when (git-fixes)\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- pvpanic: Fix typos in the comments (git-fixes).\n- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).\n- qed: display VF trust config (git-fixes).\n- qede: confirm skb is allocated before using (git-fixes).\n- qed: fix ethtool register dump (jsc#SLE-19001).\n- qed: return status of qed_iov_get_link (git-fixes).\n- qla2xxx: add -\u003emap_queues support for nvme (bsc#1195823).\n- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).\n- raid5: introduce MD_BROKEN (git-fixes).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: wake up /dev/random writers after zap (git-fixes).\n- random: wire up fops-\u003esplice_{read,write}_iter() (git-fixes).\n- ray_cs: Check ioremap return value (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (git-fixes).\n- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).\n- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).\n- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/irdma: Fix netdev notifications for vlan\u0027s (git-fixes).\n- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).\n- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).\n- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).\n- RDMA/irdma: Prevent some integer underflows (git-fixes).\n- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).\n- RDMA/irdma: Remove incorrect masking of PD (git-fixes).\n- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/mlx5: Add a missing update of cache-\u003elast_add (git-fixes).\n- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).\n- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).\n- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).\n- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).\n- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).\n- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).\n- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).\n- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).\n- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).\n- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).\n- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).\n- regmap-irq: Update interrupt clear register for proper reset (git-fixes).\n- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).\n- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).\n- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).\n- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).\n- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).\n- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).\n- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).\n- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).\n- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).\n- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).\n- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).\n- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).\n- Revert \u0027drm/amd/display: Fix DCN3 B0 DP Alt Mapping\u0027 (git-fixes).\n- Revert \u0027svm: Add warning message for AVIC IPI invalid target\u0027 (git-fixes).\n- rfkill: make new event layout opt-in (git-fixes).\n- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).\n- riscv: Fix fill_callchain return value (git fixes).\n- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).\n- rpmsg: qcom_smd: Fix redundant channel-\u003eregistered assignment (git-fixes).\n- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).\n- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).\n- rtc: check if __rtc_read_time was successful (git-fixes).\n- rtc: fix use-after-free on device removal (git-fixes).\n- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).\n- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).\n- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).\n- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).\n- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).\n- rtc: mxc: Silence a clang warning (git-fixes).\n- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).\n- rtc: pl031: fix rtc features null pointer dereference (git-fixes).\n- rtc: sun6i: Fix time overflow handling (git-fixes).\n- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- rtl818x: Prevent using not initialized queues (git-fixes).\n- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).\n- rtw88: 8821c: fix debugfs rssi value (git-fixes).\n- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).\n- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).\n- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390-dasd-fix-data-corruption-for-ESE-devices (bsc#1200205 LTC#198456).\n- s390/dasd: fix data corruption for ESE devices (git-fixes).\n- s390-dasd-Fix-read-for-ESE-with-blksize-4k (bsc#1200211 LTC#198457).\n- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).\n- s390-dasd-Fix-read-inconsistency-for-ESE-DASD-devices (bsc#1200211 LTC#198457).\n- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).\n- s390-dasd-prevent-double-format-of-tracks-for-ESE-devices (bsc#1200205 LTC#198456).\n- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).\n- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).\n- s390/extable: fix exception table sorting (git-fixes).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).\n- s390/setup: avoid reserving memory above identity mapping (git-fixes).\n- s390/smp: sort out physical vs virtual pointers usage (git-fixes).\n- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).\n- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).\n- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).\n- sched/core: Export pelt_thermal_tp (git-fixes)\n- sched/core: Fix forceidle balancing (git-fixes)\n- sched/core: Mitigate race (git-fixes)\n- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)\n- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).\n- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).\n- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).\n- sched/fair: Revise comment about lb decision matrix (git-fixes)\n- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)\n- sched: Fix yet more sched_fork() races (git fixes (sched/core)).\n- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)\n- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).\n- sched/numa: Apply imbalance limitations consistently (bnc#1193431).\n- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).\n- sched/numa: Initialise numa_migrate_retry (bnc#1193431).\n- sched/pasid: Add a kABI workaround (jsc#SLE-24350).\n- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)\n- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)\n- sched/psi: report zeroes for CPU full at the system level (git-fixes)\n- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)\n- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)\n- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)\n- sched/sugov: Ignore busy filter when rq is capped by (git-fixes)\n- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)\n- scripts/faddr2line: Fix overlapping text section failures (git-fixes).\n- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).\n- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).\n- scsi: core: Query VPD size before getting full page (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).\n- scsi: hisi_sas: Fix some issues related to asd_sas_port-phy_list (bsc#1198802).\n- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).\n- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).\n- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).\n- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).\n- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).\n- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).\n- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).\n- scsi: libsas: Keep host active while processing events (bsc#1198802).\n- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).\n- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).\n- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).\n- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).\n- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).\n- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).\n- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).\n- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).\n- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).\n- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).\n- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).\n- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).\n- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).\n- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).\n- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).\n- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).\n- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).\n- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).\n- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).\n- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).\n- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).\n- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).\n- scsi: lpfc: Remove unneeded variable (bsc#1200045).\n- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).\n- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).\n- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).\n- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).\n- scsi: lpfc: Zero SLI4 fcp_cmnd buffer\u0027s fcpCntl0 field (bsc#1200045).\n- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).\n- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).\n- scsi: mpt3sas: Page fault in reply q processing (git-fixes).\n- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).\n- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).\n- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).\n- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- selftest: KVM: Add open sev dev helper (bsc#1194526).\n- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).\n- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).\n- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).\n- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).\n- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).\n- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).\n- selftests: kvm: Remove absent target file (git-fixes).\n- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).\n- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).\n- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).\n- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).\n- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).\n- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).\n- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).\n- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).\n- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).\n- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).\n- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).\n- serial: imx: fix overrun interrupts in DMA mode (git-fixes).\n- serial: meson: acquire port-\u003elock in startup() (git-fixes).\n- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).\n- serial: pch: do not overwrite xmit-\u003ebuf[0] by x_char (git-fixes).\n- serial: rda-uart: Do not allow CS5-6 (git-fixes).\n- serial: samsung_tty: do not unlock port-\u003elock for uart_write_wakeup() (git-fixes).\n- serial: sh-sci: Do not allow CS5-6 (git-fixes).\n- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).\n- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).\n- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).\n- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).\n- serial: txx9: Do not allow CS5-6 (git-fixes).\n- sfc: Do not free an empty page_ring (git-fixes).\n- sfc: fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: Use swap() instead of open coding it (bsc#1196306).\n- sfc: use swap() to make code cleaner (bsc#1196306).\n- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).\n- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).\n- slip: fix macro redefine warning (git-fixes).\n- smb3: add mount parm nosparse (bsc#1193629).\n- smb3: add trace point for lease not found issue (bsc#1193629).\n- smb3: add trace point for oplock not found (bsc#1193629).\n- smb3: check for null tcon (bsc#1193629).\n- smb3: cleanup and clarify status of tree connections (bsc#1193629).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).\n- smb3: fix snapshot mount option (bsc#1193629).\n- [smb3] improve error message when mount options conflict with posix (bsc#1193629).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1193629).\n- smb3: send NTLMSSP version information (bsc#1193629).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- smsc911x: allow using IRQ0 (git-fixes).\n- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).\n- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).\n- soc: qcom: aoss: Expose send for generic usecase (git-fixes).\n- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).\n- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).\n- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).\n- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).\n- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).\n- sound/oss/dmasound: fix \u0027dmasound_setup\u0027 defined but not used (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).\n- soundwire: qcom: adjust autoenumeration timeout (git-fixes).\n- speakup-dectlk: Restore pitch setting (git-fixes).\n- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).\n- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).\n- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).\n- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).\n- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).\n- spi: Fix erroneous sgs value with min_t() (git-fixes).\n- spi: Fix invalid sgs value (git-fixes).\n- spi: Fix Tegra QSPI example (git-fixes).\n- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).\n- spi: mxic: Fix the transmit path (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).\n- spi: rockchip: Fix error in getting num-cs property (git-fixes).\n- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).\n- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).\n- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).\n- spi: rockchip: terminate dma transmission when slave abort (git-fixes).\n- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).\n- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).\n- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).\n- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).\n- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).\n- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- spi: tegra20: Use of_device_get_match_data() (git-fixes).\n- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).\n- staging: most: dim2: use device release method (git-fixes).\n- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).\n- staging: mt7621-dts: fix formatting (git-fixes).\n- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).\n- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).\n- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).\n- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).\n- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).\n- staging: vc04_services: shut up out-of-range warning (git-fixes).\n- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).\n- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).\n- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).\n- staging: vchiq: Move vchiq char driver to its own file (git-fixes).\n- staging: vchiq: Refactor vchiq cdev code (git-fixes).\n- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).\n- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).\n- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).\n- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).\n- SUNRPC do not resend a task on an offlined transport (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).\n- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).\n- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).\n- SUNRPC: Trap RDMA segment overflows (git-fixes).\n- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).\n- supported.conf: add intel_sdsi\n- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)\n- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)\n- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).\n- swiotlb: max mapping size takes min align mask into account (bsc#1197303).\n- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).\n- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).\n- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).\n- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).\n- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).\n- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).\n- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).\n- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Fix attr.show callback prototype (git-fixes).\n- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).\n- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).\n- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)\n- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)\n- timers: Fix warning condition in __run_timers() (git-fixes)\n- TOMOYO: fix __setup handlers return values (git-fixes).\n- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).\n- tools: bpftool: Complete metrics list in \u0027bpftool prog profile\u0027 doc (git-fixes).\n- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).\n- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).\n- tpm: Fix error handling in async work (git-fixes).\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tpm: use try_get_ops() in tpm-space.c (git-fixes).\n- tps6598x: clear int mask on probe failure (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix potential double free in create_var_ref() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have trace event string test handle zero length strings (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histogram: Fix sorting on old \u0027cpu\u0027 value (git-fixes).\n- tracing/osnoise: Force quiescent states while tracing (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).\n- tty: Fix a possible resource leak in icom_probe (git-fixes).\n- tty: fix deadlock caused by calling printk() under tty_port-\u003elock (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).\n- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).\n- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).\n- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).\n- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).\n- tty: n_gsm: Fix packet data hex dump output (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).\n- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).\n- tty: n_tty: Restore EOF push handling behavior (git-fixes).\n- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).\n- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).\n- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).\n- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).\n- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).\n- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).\n- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).\n- udmabuf: validate ubuf-\u003epagecount (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).\n- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).\n- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).\n- usb: core: hcd: Add support for deferring roothub registration (git-fixes).\n- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: dwc2: gadget: do not reset gadget\u0027s driver-\u003ebus (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: Decouple USB 2.0 L1 \u0026 L2 events (git-fixes).\n- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).\n- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).\n- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).\n- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Return proper request status (git-fixes).\n- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).\n- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).\n- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).\n- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).\n- usb: dwc3: omap: fix \u0027unbalanced disables for smps10_out1\u0027 on omap5evm (git-fixes).\n- usb: dwc3: pci: Add \u0027snps,dis_u2_susphy_quirk\u0027 for Intel Bay Trail (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).\n- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).\n- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).\n- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).\n- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).\n- usb: ehci: add pci device support for Aspeed platforms (git-fixes).\n- usb: ehci-omap: drop unused ehci_read() function (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).\n- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).\n- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: gadget: f_fs: change ep-\u003eep safe in ffs_epfile_io() (git-fixes).\n- usb: gadget: f_fs: change ep-\u003estatus safe in ffs_epfile_io() (git-fixes).\n- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).\n- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).\n- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc-\u003edev.driver (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).\n- usb: gadget: tegra-xudc: Fix control endpoint\u0027s definitions (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).\n- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).\n- usb: gadget: uvc: rename function to be more consistent (git-fixes).\n- usb: gadget: validate endpoint index for xilinx udc (git-fixes).\n- usb: gadget: validate interface OS descriptor requests (git-fixes).\n- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).\n- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).\n- usb: isp1760: Fix out-of-bounds array access (git-fixes).\n- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- usb: new quirk for Dell Gen 2 devices (git-fixes).\n- usb: phy: generic: Get the vbus supply (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).\n- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- usb: serial: io_ti: add Agilent E5805A support (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- usb: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- usb: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add support for DW5829e (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: serial: option: add Telit LE910R1 compositions (git-fixes).\n- usb: serial: option: add ZTE MF286D modem (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).\n- usb: serial: pl2303: fix GS type detection (git-fixes).\n- usb: serial: pl2303: fix type detection for odd device (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: simple: add Nokia phone driver (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- usb: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- usb: typec: mux: Check dev_set_name() return value (git-fixes).\n- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).\n- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).\n- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).\n- usb: typec: ucsi: Fix role swapping (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).\n- usb: zaurus: support another broken Zaurus (git-fixes).\n- vdpasim: allow to enable a vq repeatedly (git-fixes).\n- veth: Ensure eth header is in skb\u0027s linear part (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).\n- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).\n- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).\n- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).\n- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)\n- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).\n- video: fbdev: w100fb: Reset global state (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- virtio_console: break out of buf poll on remove (git-fixes).\n- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio: fix virtio transitional ids (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix for skb_over_panic inside big mode (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-net: realign page_to_skb() after merges (git-fixes).\n- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vringh: Fix loop descriptors check in the indirect cases (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- vsprintf: Fix potential unaligned access (bsc#1198379).\n- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).\n- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).\n- vxcan: enable local echo for sent CAN frames (git-fixes).\n- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).\n- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).\n- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).\n- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).\n- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).\n- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).\n- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).\n- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).\n- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).\n- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).\n- watch_queue: Actually free the watch (git-fixes).\n- watch_queue: Fix NULL dereference in error cleanup (git-fixes).\n- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).\n- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).\n- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).\n- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).\n- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).\n- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).\n- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).\n- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).\n- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).\n- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).\n- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).\n- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).\n- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).\n- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).\n- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).\n- x86/kvmclock: Fix Hyper-V Isolated VM boot issue when vCPUs 64 (bsc#1183682).\n- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).\n- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).\n- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).\n- x86/module: Fix the paravirt vs alternative order (bsc#1190497).\n- x86/pm: Save the MSR validity status at context setup (bsc#1190497).\n- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).\n- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).\n- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).\n- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).\n- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).\n- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).\n- xfs: drop async cache flushes from CIL commits (bsc#1195669).\n- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).\n- xhci: Enable runtime PM on second Alderlake controller (git-fixes).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).\n- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).\n- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).\n- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n- xhci: turn off port power in shutdown (git-fixes).\n- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).\n- zsmalloc: decouple class actions from zspage works (bsc#1189998).\n- zsmalloc: introduce obj_allocated (bsc#1189998).\n- zsmalloc: introduce some helper functions (bsc#1189998).\n- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).\n- zsmalloc: remove zspage isolation for migration (bsc#1189998).\n- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).\n- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).\n- zsmalloc: replace per zpage lock with pool migrate_lock (bsc#1189998).\n- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2022-2615,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2615,openSUSE-SLE-15.4-2022-2615", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2615-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2022:2615-1", "url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222615-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2022:2615-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1103269", "url": "https://bugzilla.suse.com/1103269" }, { "category": "self", "summary": "SUSE Bug 1118212", "url": "https://bugzilla.suse.com/1118212" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1137728", "url": "https://bugzilla.suse.com/1137728" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157038", "url": "https://bugzilla.suse.com/1157038" }, { "category": "self", "summary": "SUSE Bug 1157923", "url": "https://bugzilla.suse.com/1157923" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1179439", "url": "https://bugzilla.suse.com/1179439" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1183682", "url": "https://bugzilla.suse.com/1183682" }, { "category": "self", "summary": "SUSE Bug 1183872", "url": "https://bugzilla.suse.com/1183872" }, { "category": "self", "summary": "SUSE Bug 1184318", "url": "https://bugzilla.suse.com/1184318" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1187716", "url": "https://bugzilla.suse.com/1187716" }, { "category": "self", "summary": "SUSE Bug 1188885", "url": "https://bugzilla.suse.com/1188885" }, { "category": "self", "summary": "SUSE Bug 1189998", "url": "https://bugzilla.suse.com/1189998" }, { "category": "self", "summary": "SUSE Bug 1190137", "url": "https://bugzilla.suse.com/1190137" }, { "category": "self", "summary": "SUSE Bug 1190208", "url": "https://bugzilla.suse.com/1190208" }, { "category": "self", "summary": "SUSE Bug 1190336", "url": "https://bugzilla.suse.com/1190336" }, { "category": "self", "summary": "SUSE Bug 1190497", "url": "https://bugzilla.suse.com/1190497" }, { "category": "self", "summary": "SUSE Bug 1190768", "url": "https://bugzilla.suse.com/1190768" }, { "category": "self", "summary": "SUSE Bug 1190786", "url": "https://bugzilla.suse.com/1190786" }, { "category": "self", "summary": "SUSE Bug 1190812", "url": "https://bugzilla.suse.com/1190812" }, { "category": "self", "summary": "SUSE Bug 1191271", "url": "https://bugzilla.suse.com/1191271" }, { "category": "self", "summary": "SUSE Bug 1191663", "url": "https://bugzilla.suse.com/1191663" }, { "category": "self", "summary": "SUSE Bug 1192483", "url": "https://bugzilla.suse.com/1192483" }, { "category": "self", "summary": "SUSE Bug 1193064", "url": "https://bugzilla.suse.com/1193064" }, { "category": "self", "summary": "SUSE Bug 1193277", "url": "https://bugzilla.suse.com/1193277" }, { "category": "self", "summary": "SUSE Bug 1193289", "url": "https://bugzilla.suse.com/1193289" }, { "category": "self", "summary": "SUSE Bug 1193431", "url": "https://bugzilla.suse.com/1193431" }, { "category": "self", "summary": "SUSE Bug 1193556", "url": "https://bugzilla.suse.com/1193556" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1193640", "url": "https://bugzilla.suse.com/1193640" }, { "category": "self", "summary": "SUSE Bug 1193787", "url": "https://bugzilla.suse.com/1193787" }, { "category": "self", "summary": "SUSE Bug 1193823", "url": "https://bugzilla.suse.com/1193823" }, { "category": "self", "summary": "SUSE Bug 1193852", "url": "https://bugzilla.suse.com/1193852" }, { "category": "self", "summary": "SUSE Bug 1194086", "url": "https://bugzilla.suse.com/1194086" }, { "category": "self", "summary": "SUSE Bug 1194111", "url": "https://bugzilla.suse.com/1194111" }, { "category": "self", "summary": "SUSE Bug 1194191", "url": "https://bugzilla.suse.com/1194191" }, { "category": "self", "summary": "SUSE Bug 1194409", "url": "https://bugzilla.suse.com/1194409" }, { "category": "self", "summary": "SUSE Bug 1194501", "url": "https://bugzilla.suse.com/1194501" }, { "category": "self", "summary": "SUSE Bug 1194523", "url": "https://bugzilla.suse.com/1194523" }, { "category": "self", "summary": "SUSE Bug 1194526", "url": "https://bugzilla.suse.com/1194526" }, { "category": "self", "summary": "SUSE Bug 1194583", "url": "https://bugzilla.suse.com/1194583" }, { "category": "self", "summary": "SUSE Bug 1194585", "url": "https://bugzilla.suse.com/1194585" }, { "category": "self", "summary": "SUSE Bug 1194586", "url": "https://bugzilla.suse.com/1194586" }, { "category": "self", "summary": "SUSE Bug 1194625", "url": "https://bugzilla.suse.com/1194625" }, { "category": "self", "summary": "SUSE Bug 1194765", "url": "https://bugzilla.suse.com/1194765" }, { "category": "self", "summary": "SUSE Bug 1194826", "url": "https://bugzilla.suse.com/1194826" }, { "category": "self", "summary": "SUSE Bug 1194869", "url": "https://bugzilla.suse.com/1194869" }, { "category": "self", "summary": "SUSE Bug 1195099", "url": "https://bugzilla.suse.com/1195099" }, { "category": "self", "summary": "SUSE Bug 1195287", "url": "https://bugzilla.suse.com/1195287" }, { "category": "self", "summary": "SUSE Bug 1195478", "url": "https://bugzilla.suse.com/1195478" }, { "category": "self", "summary": "SUSE Bug 1195482", "url": "https://bugzilla.suse.com/1195482" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195651", "url": "https://bugzilla.suse.com/1195651" }, { "category": "self", "summary": "SUSE Bug 1195668", "url": "https://bugzilla.suse.com/1195668" }, { "category": "self", "summary": "SUSE Bug 1195669", "url": "https://bugzilla.suse.com/1195669" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1195823", "url": "https://bugzilla.suse.com/1195823" }, { "category": "self", "summary": "SUSE Bug 1195826", "url": "https://bugzilla.suse.com/1195826" }, { "category": "self", "summary": "SUSE Bug 1195913", "url": "https://bugzilla.suse.com/1195913" }, { "category": "self", "summary": "SUSE Bug 1195915", "url": "https://bugzilla.suse.com/1195915" }, { "category": "self", "summary": "SUSE Bug 1195926", "url": "https://bugzilla.suse.com/1195926" }, { "category": "self", "summary": "SUSE Bug 1195944", "url": "https://bugzilla.suse.com/1195944" }, { "category": "self", "summary": "SUSE Bug 1195957", "url": "https://bugzilla.suse.com/1195957" }, { "category": "self", "summary": "SUSE Bug 1195987", "url": "https://bugzilla.suse.com/1195987" }, { "category": "self", "summary": "SUSE Bug 1196079", "url": "https://bugzilla.suse.com/1196079" }, { "category": "self", "summary": "SUSE Bug 1196114", "url": "https://bugzilla.suse.com/1196114" }, { "category": "self", "summary": "SUSE Bug 1196130", "url": "https://bugzilla.suse.com/1196130" }, { "category": "self", "summary": "SUSE Bug 1196213", "url": "https://bugzilla.suse.com/1196213" }, { "category": "self", "summary": "SUSE Bug 1196306", "url": "https://bugzilla.suse.com/1196306" }, { "category": "self", "summary": "SUSE Bug 1196367", "url": "https://bugzilla.suse.com/1196367" }, { "category": "self", "summary": "SUSE Bug 1196400", "url": "https://bugzilla.suse.com/1196400" }, { "category": "self", "summary": "SUSE Bug 1196426", "url": "https://bugzilla.suse.com/1196426" }, { "category": "self", "summary": "SUSE Bug 1196478", "url": "https://bugzilla.suse.com/1196478" }, { "category": "self", "summary": "SUSE Bug 1196514", "url": "https://bugzilla.suse.com/1196514" }, { "category": "self", "summary": "SUSE Bug 1196570", "url": "https://bugzilla.suse.com/1196570" }, { "category": "self", "summary": "SUSE Bug 1196723", "url": "https://bugzilla.suse.com/1196723" }, { "category": "self", "summary": "SUSE Bug 1196779", "url": "https://bugzilla.suse.com/1196779" }, { "category": "self", "summary": "SUSE Bug 1196830", "url": "https://bugzilla.suse.com/1196830" }, { "category": "self", "summary": "SUSE Bug 1196836", "url": "https://bugzilla.suse.com/1196836" }, { "category": "self", "summary": "SUSE Bug 1196866", "url": "https://bugzilla.suse.com/1196866" }, { "category": "self", "summary": "SUSE Bug 1196868", "url": "https://bugzilla.suse.com/1196868" }, { "category": "self", "summary": "SUSE Bug 1196869", "url": "https://bugzilla.suse.com/1196869" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1196930", "url": "https://bugzilla.suse.com/1196930" }, { "category": "self", "summary": "SUSE Bug 1196942", "url": "https://bugzilla.suse.com/1196942" }, { "category": "self", "summary": "SUSE Bug 1196960", "url": "https://bugzilla.suse.com/1196960" }, { "category": "self", "summary": "SUSE Bug 1197016", "url": "https://bugzilla.suse.com/1197016" }, { "category": "self", "summary": "SUSE Bug 1197157", "url": "https://bugzilla.suse.com/1197157" }, { "category": "self", "summary": "SUSE Bug 1197227", "url": "https://bugzilla.suse.com/1197227" }, { "category": "self", "summary": "SUSE Bug 1197243", "url": "https://bugzilla.suse.com/1197243" }, { "category": "self", "summary": "SUSE Bug 1197292", "url": "https://bugzilla.suse.com/1197292" }, { "category": "self", "summary": "SUSE Bug 1197302", "url": "https://bugzilla.suse.com/1197302" }, { "category": "self", "summary": "SUSE Bug 1197303", "url": "https://bugzilla.suse.com/1197303" }, { "category": "self", "summary": "SUSE Bug 1197304", "url": "https://bugzilla.suse.com/1197304" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197386", "url": "https://bugzilla.suse.com/1197386" }, { "category": "self", "summary": "SUSE Bug 1197501", "url": "https://bugzilla.suse.com/1197501" }, { "category": "self", "summary": "SUSE Bug 1197601", "url": "https://bugzilla.suse.com/1197601" }, { "category": "self", "summary": "SUSE Bug 1197661", "url": "https://bugzilla.suse.com/1197661" }, { "category": "self", "summary": "SUSE Bug 1197675", "url": "https://bugzilla.suse.com/1197675" }, { "category": "self", "summary": "SUSE Bug 1197761", "url": "https://bugzilla.suse.com/1197761" }, { "category": "self", "summary": "SUSE Bug 1197817", "url": "https://bugzilla.suse.com/1197817" }, { "category": "self", "summary": "SUSE Bug 1197819", "url": "https://bugzilla.suse.com/1197819" }, { "category": "self", "summary": "SUSE Bug 1197820", "url": "https://bugzilla.suse.com/1197820" }, { "category": "self", "summary": "SUSE Bug 1197888", "url": "https://bugzilla.suse.com/1197888" }, { "category": "self", "summary": "SUSE Bug 1197889", "url": "https://bugzilla.suse.com/1197889" }, { "category": "self", "summary": "SUSE Bug 1197894", "url": "https://bugzilla.suse.com/1197894" }, { "category": "self", "summary": "SUSE Bug 1197915", "url": "https://bugzilla.suse.com/1197915" }, { "category": "self", "summary": "SUSE Bug 1197917", "url": "https://bugzilla.suse.com/1197917" }, { "category": "self", "summary": "SUSE Bug 1197918", "url": "https://bugzilla.suse.com/1197918" }, { "category": "self", "summary": "SUSE Bug 1197920", "url": "https://bugzilla.suse.com/1197920" }, { "category": "self", "summary": "SUSE Bug 1197921", "url": "https://bugzilla.suse.com/1197921" }, { "category": "self", "summary": "SUSE Bug 1197922", "url": "https://bugzilla.suse.com/1197922" }, { "category": "self", "summary": "SUSE Bug 1197926", "url": "https://bugzilla.suse.com/1197926" }, { "category": "self", "summary": "SUSE Bug 1198009", "url": "https://bugzilla.suse.com/1198009" }, { "category": "self", "summary": "SUSE Bug 1198010", "url": "https://bugzilla.suse.com/1198010" }, { "category": "self", "summary": "SUSE Bug 1198012", "url": "https://bugzilla.suse.com/1198012" }, { "category": "self", "summary": "SUSE Bug 1198013", "url": "https://bugzilla.suse.com/1198013" }, { "category": "self", "summary": "SUSE Bug 1198014", "url": "https://bugzilla.suse.com/1198014" }, { "category": "self", "summary": "SUSE Bug 1198015", "url": "https://bugzilla.suse.com/1198015" }, { "category": "self", "summary": "SUSE Bug 1198016", "url": "https://bugzilla.suse.com/1198016" }, { "category": "self", "summary": "SUSE Bug 1198017", "url": "https://bugzilla.suse.com/1198017" }, { "category": "self", "summary": "SUSE Bug 1198018", "url": "https://bugzilla.suse.com/1198018" }, { "category": "self", "summary": "SUSE Bug 1198019", "url": "https://bugzilla.suse.com/1198019" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198021", "url": "https://bugzilla.suse.com/1198021" }, { "category": "self", "summary": "SUSE Bug 1198022", "url": "https://bugzilla.suse.com/1198022" }, { "category": "self", "summary": "SUSE Bug 1198023", "url": "https://bugzilla.suse.com/1198023" }, { "category": "self", "summary": "SUSE Bug 1198024", "url": "https://bugzilla.suse.com/1198024" }, { "category": "self", "summary": "SUSE Bug 1198027", "url": "https://bugzilla.suse.com/1198027" }, { "category": "self", "summary": "SUSE Bug 1198030", "url": "https://bugzilla.suse.com/1198030" }, { "category": "self", "summary": "SUSE Bug 1198034", "url": "https://bugzilla.suse.com/1198034" }, { "category": "self", "summary": "SUSE Bug 1198058", "url": "https://bugzilla.suse.com/1198058" }, { "category": "self", "summary": "SUSE Bug 1198217", "url": "https://bugzilla.suse.com/1198217" }, { "category": "self", "summary": "SUSE Bug 1198379", "url": "https://bugzilla.suse.com/1198379" }, { "category": "self", "summary": "SUSE Bug 1198400", "url": "https://bugzilla.suse.com/1198400" }, { "category": "self", "summary": "SUSE Bug 1198402", "url": "https://bugzilla.suse.com/1198402" }, { "category": "self", "summary": "SUSE Bug 1198412", "url": "https://bugzilla.suse.com/1198412" }, { "category": "self", "summary": "SUSE Bug 1198413", "url": "https://bugzilla.suse.com/1198413" }, { "category": "self", "summary": "SUSE Bug 1198438", "url": "https://bugzilla.suse.com/1198438" }, { "category": "self", "summary": "SUSE Bug 1198484", "url": "https://bugzilla.suse.com/1198484" }, { "category": "self", "summary": "SUSE Bug 1198577", "url": "https://bugzilla.suse.com/1198577" }, { "category": "self", "summary": "SUSE Bug 1198585", "url": "https://bugzilla.suse.com/1198585" }, { "category": "self", "summary": "SUSE Bug 1198660", "url": "https://bugzilla.suse.com/1198660" }, { "category": "self", "summary": "SUSE Bug 1198802", "url": "https://bugzilla.suse.com/1198802" }, { "category": "self", "summary": "SUSE Bug 1198803", "url": "https://bugzilla.suse.com/1198803" }, { "category": "self", "summary": "SUSE Bug 1198806", "url": "https://bugzilla.suse.com/1198806" }, { "category": "self", "summary": "SUSE Bug 1198811", "url": "https://bugzilla.suse.com/1198811" }, { "category": "self", "summary": "SUSE Bug 1198826", "url": "https://bugzilla.suse.com/1198826" }, { "category": "self", "summary": "SUSE Bug 1198835", "url": "https://bugzilla.suse.com/1198835" }, { "category": "self", "summary": "SUSE Bug 1198968", "url": "https://bugzilla.suse.com/1198968" }, { "category": "self", "summary": "SUSE Bug 1198971", "url": "https://bugzilla.suse.com/1198971" }, { "category": "self", "summary": "SUSE Bug 1199011", "url": "https://bugzilla.suse.com/1199011" }, { "category": "self", "summary": "SUSE Bug 1199024", "url": "https://bugzilla.suse.com/1199024" }, { "category": "self", "summary": "SUSE Bug 1199035", "url": "https://bugzilla.suse.com/1199035" }, { "category": "self", "summary": "SUSE Bug 1199046", "url": "https://bugzilla.suse.com/1199046" }, { "category": "self", "summary": "SUSE Bug 1199052", "url": "https://bugzilla.suse.com/1199052" }, { "category": "self", "summary": "SUSE Bug 1199063", "url": "https://bugzilla.suse.com/1199063" }, { "category": "self", "summary": "SUSE Bug 1199163", "url": "https://bugzilla.suse.com/1199163" }, { "category": "self", "summary": "SUSE Bug 1199173", "url": "https://bugzilla.suse.com/1199173" }, { "category": "self", "summary": "SUSE Bug 1199260", "url": "https://bugzilla.suse.com/1199260" }, { "category": "self", "summary": "SUSE Bug 1199314", "url": "https://bugzilla.suse.com/1199314" }, { "category": "self", "summary": "SUSE Bug 1199390", "url": "https://bugzilla.suse.com/1199390" }, { "category": "self", "summary": "SUSE Bug 1199426", "url": "https://bugzilla.suse.com/1199426" }, { "category": "self", "summary": "SUSE Bug 1199433", "url": "https://bugzilla.suse.com/1199433" }, { "category": "self", "summary": "SUSE Bug 1199439", "url": "https://bugzilla.suse.com/1199439" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199505", "url": "https://bugzilla.suse.com/1199505" }, { "category": "self", "summary": "SUSE Bug 1199507", "url": "https://bugzilla.suse.com/1199507" }, { "category": "self", "summary": "SUSE Bug 1199605", "url": "https://bugzilla.suse.com/1199605" }, { "category": "self", "summary": "SUSE Bug 1199611", "url": "https://bugzilla.suse.com/1199611" }, { "category": "self", "summary": "SUSE Bug 1199626", "url": "https://bugzilla.suse.com/1199626" }, { "category": "self", "summary": "SUSE Bug 1199631", "url": "https://bugzilla.suse.com/1199631" }, { "category": "self", "summary": "SUSE Bug 1199650", "url": "https://bugzilla.suse.com/1199650" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1199674", "url": "https://bugzilla.suse.com/1199674" }, { "category": "self", "summary": "SUSE Bug 1199736", "url": "https://bugzilla.suse.com/1199736" }, { "category": "self", "summary": "SUSE Bug 1199793", "url": "https://bugzilla.suse.com/1199793" }, { "category": "self", "summary": "SUSE Bug 1199839", "url": "https://bugzilla.suse.com/1199839" }, { "category": "self", "summary": "SUSE Bug 1199875", "url": "https://bugzilla.suse.com/1199875" }, { "category": "self", "summary": "SUSE Bug 1199909", "url": "https://bugzilla.suse.com/1199909" }, { "category": "self", "summary": "SUSE Bug 1200015", "url": "https://bugzilla.suse.com/1200015" }, { "category": "self", "summary": "SUSE Bug 1200019", "url": "https://bugzilla.suse.com/1200019" }, { "category": "self", "summary": "SUSE Bug 1200045", "url": "https://bugzilla.suse.com/1200045" }, { "category": "self", "summary": "SUSE Bug 1200046", "url": "https://bugzilla.suse.com/1200046" }, { "category": "self", "summary": "SUSE Bug 1200144", "url": "https://bugzilla.suse.com/1200144" }, { "category": "self", "summary": "SUSE Bug 1200205", "url": "https://bugzilla.suse.com/1200205" }, { "category": "self", "summary": "SUSE Bug 1200211", "url": "https://bugzilla.suse.com/1200211" }, { "category": "self", "summary": "SUSE Bug 1200259", "url": "https://bugzilla.suse.com/1200259" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200284", "url": "https://bugzilla.suse.com/1200284" }, { "category": "self", "summary": "SUSE Bug 1200315", "url": "https://bugzilla.suse.com/1200315" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200420", "url": "https://bugzilla.suse.com/1200420" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200475", "url": "https://bugzilla.suse.com/1200475" }, { "category": "self", "summary": "SUSE Bug 1200502", "url": "https://bugzilla.suse.com/1200502" }, { "category": "self", "summary": "SUSE Bug 1200567", "url": "https://bugzilla.suse.com/1200567" }, { "category": "self", "summary": "SUSE Bug 1200569", "url": "https://bugzilla.suse.com/1200569" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200572", "url": "https://bugzilla.suse.com/1200572" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200611", "url": "https://bugzilla.suse.com/1200611" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200762", "url": "https://bugzilla.suse.com/1200762" }, { "category": "self", "summary": "SUSE Bug 1200763", "url": "https://bugzilla.suse.com/1200763" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200808", "url": "https://bugzilla.suse.com/1200808" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200812", "url": "https://bugzilla.suse.com/1200812" }, { "category": "self", "summary": "SUSE Bug 1200815", "url": "https://bugzilla.suse.com/1200815" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200824", "url": "https://bugzilla.suse.com/1200824" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200827", "url": "https://bugzilla.suse.com/1200827" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200830", "url": "https://bugzilla.suse.com/1200830" }, { "category": "self", "summary": "SUSE Bug 1200845", "url": "https://bugzilla.suse.com/1200845" }, { "category": "self", "summary": "SUSE Bug 1200882", "url": "https://bugzilla.suse.com/1200882" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201196", "url": "https://bugzilla.suse.com/1201196" }, { "category": "self", "summary": "SUSE Bug 1201218", "url": "https://bugzilla.suse.com/1201218" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201228", "url": "https://bugzilla.suse.com/1201228" }, { "category": "self", "summary": "SUSE Bug 1201251", "url": "https://bugzilla.suse.com/1201251" }, { "category": "self", "summary": "SUSE Bug 150300", "url": "https://bugzilla.suse.com/150300" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33061 page", "url": "https://www.suse.com/security/cve/CVE-2021-33061/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4204 page", "url": "https://www.suse.com/security/cve/CVE-2021-4204/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-44879 page", "url": "https://www.suse.com/security/cve/CVE-2021-44879/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45402 page", "url": "https://www.suse.com/security/cve/CVE-2021-45402/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0264 page", "url": "https://www.suse.com/security/cve/CVE-2022-0264/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0494 page", "url": "https://www.suse.com/security/cve/CVE-2022-0494/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0617 page", "url": "https://www.suse.com/security/cve/CVE-2022-0617/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1016 page", "url": "https://www.suse.com/security/cve/CVE-2022-1016/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1184 page", "url": "https://www.suse.com/security/cve/CVE-2022-1184/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1198 page", "url": "https://www.suse.com/security/cve/CVE-2022-1198/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1205 page", "url": "https://www.suse.com/security/cve/CVE-2022-1205/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1508 page", "url": "https://www.suse.com/security/cve/CVE-2022-1508/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1651 page", "url": "https://www.suse.com/security/cve/CVE-2022-1651/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1652 page", "url": "https://www.suse.com/security/cve/CVE-2022-1652/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1671 page", "url": "https://www.suse.com/security/cve/CVE-2022-1671/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1734 page", "url": "https://www.suse.com/security/cve/CVE-2022-1734/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1789 page", "url": "https://www.suse.com/security/cve/CVE-2022-1789/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1974 page", "url": "https://www.suse.com/security/cve/CVE-2022-1974/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1998 page", "url": "https://www.suse.com/security/cve/CVE-2022-1998/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21123 page", "url": "https://www.suse.com/security/cve/CVE-2022-21123/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21125 page", "url": "https://www.suse.com/security/cve/CVE-2022-21125/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21127 page", "url": "https://www.suse.com/security/cve/CVE-2022-21127/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21166 page", "url": "https://www.suse.com/security/cve/CVE-2022-21166/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21180 page", "url": "https://www.suse.com/security/cve/CVE-2022-21180/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-21499 page", "url": "https://www.suse.com/security/cve/CVE-2022-21499/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2318 page", "url": "https://www.suse.com/security/cve/CVE-2022-2318/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-23222 page", "url": "https://www.suse.com/security/cve/CVE-2022-23222/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26365 page", "url": "https://www.suse.com/security/cve/CVE-2022-26365/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29582 page", "url": "https://www.suse.com/security/cve/CVE-2022-29582/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-30594 page", "url": "https://www.suse.com/security/cve/CVE-2022-30594/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33740 page", "url": "https://www.suse.com/security/cve/CVE-2022-33740/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33741 page", "url": "https://www.suse.com/security/cve/CVE-2022-33741/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33742 page", "url": "https://www.suse.com/security/cve/CVE-2022-33742/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33743 page", "url": "https://www.suse.com/security/cve/CVE-2022-33743/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-08-01T08:42:02Z", "generator": { "date": "2022-08-01T08:42:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2022:2615-1", "initial_release_date": "2022-08-01T08:42:02Z", "revision_history": [ { "date": "2022-08-01T08:42:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product": { "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "product_id": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "product": { "name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "product_id": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch", "product": { "name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch", "product_id": "kernel-source-azure-5.14.21-150400.14.7.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64", "product_id": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4" } } }, { "category": "product_name", "name": "openSUSE Leap 15.4", "product": { "name": "openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch" }, "product_reference": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch" }, "product_reference": "kernel-source-azure-5.14.21-150400.14.7.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch" }, "product_reference": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch" }, "product_reference": "kernel-source-azure-5.14.21-150400.14.7.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64" }, "product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.4" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4", "product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" }, "product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-33061", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33061" } ], "notes": [ { "category": "general", "text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33061", "url": "https://www.suse.com/security/cve/CVE-2021-33061" }, { "category": "external", "summary": "SUSE Bug 1196426 for CVE-2021-33061", "url": "https://bugzilla.suse.com/1196426" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2021-33061" }, { "cve": "CVE-2021-4204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4204" } ], "notes": [ { "category": "general", "text": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel\u0027s eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4204", "url": "https://www.suse.com/security/cve/CVE-2021-4204" }, { "category": "external", "summary": "SUSE Bug 1194111 for CVE-2021-4204", "url": "https://bugzilla.suse.com/1194111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2021-4204" }, { "cve": "CVE-2021-44879", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-44879" } ], "notes": [ { "category": "general", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-44879", "url": "https://www.suse.com/security/cve/CVE-2021-44879" }, { "category": "external", "summary": "SUSE Bug 1195987 for CVE-2021-44879", "url": "https://bugzilla.suse.com/1195987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2021-45402", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45402" } ], "notes": [ { "category": "general", "text": "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45402", "url": "https://www.suse.com/security/cve/CVE-2021-45402" }, { "category": "external", "summary": "SUSE Bug 1196130 for CVE-2021-45402", "url": "https://bugzilla.suse.com/1196130" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2021-45402" }, { "cve": "CVE-2022-0264", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0264" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0264", "url": "https://www.suse.com/security/cve/CVE-2022-0264" }, { "category": "external", "summary": "SUSE Bug 1194826 for CVE-2022-0264", "url": "https://bugzilla.suse.com/1194826" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-0264" }, { "cve": "CVE-2022-0494", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0494" } ], "notes": [ { "category": "general", "text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0494", "url": "https://www.suse.com/security/cve/CVE-2022-0494" }, { "category": "external", "summary": "SUSE Bug 1197386 for CVE-2022-0494", "url": "https://bugzilla.suse.com/1197386" }, { "category": "external", "summary": "SUSE Bug 1207783 for CVE-2022-0494", "url": "https://bugzilla.suse.com/1207783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-0494" }, { "cve": "CVE-2022-0617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0617" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0617", "url": "https://www.suse.com/security/cve/CVE-2022-0617" }, { "category": "external", "summary": "SUSE Bug 1196079 for CVE-2022-0617", "url": "https://bugzilla.suse.com/1196079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-0617" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1016" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1016", "url": "https://www.suse.com/security/cve/CVE-2022-1016" }, { "category": "external", "summary": "SUSE Bug 1197227 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197227" }, { "category": "external", "summary": "SUSE Bug 1197335 for CVE-2022-1016", "url": "https://bugzilla.suse.com/1197335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1016" }, { "cve": "CVE-2022-1184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1184" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1184", "url": "https://www.suse.com/security/cve/CVE-2022-1184" }, { "category": "external", "summary": "SUSE Bug 1198577 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1198577" }, { "category": "external", "summary": "SUSE Bug 1210859 for CVE-2022-1184", "url": "https://bugzilla.suse.com/1210859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1198", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1198" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1198", "url": "https://www.suse.com/security/cve/CVE-2022-1198" }, { "category": "external", "summary": "SUSE Bug 1198030 for CVE-2022-1198", "url": "https://bugzilla.suse.com/1198030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1198" }, { "cve": "CVE-2022-1205", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1205" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1205", "url": "https://www.suse.com/security/cve/CVE-2022-1205" }, { "category": "external", "summary": "SUSE Bug 1198027 for CVE-2022-1205", "url": "https://bugzilla.suse.com/1198027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1205" }, { "cve": "CVE-2022-1508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1508" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1508", "url": "https://www.suse.com/security/cve/CVE-2022-1508" }, { "category": "external", "summary": "SUSE Bug 1198968 for CVE-2022-1508", "url": "https://bugzilla.suse.com/1198968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1508" }, { "cve": "CVE-2022-1651", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1651" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1651", "url": "https://www.suse.com/security/cve/CVE-2022-1651" }, { "category": "external", "summary": "SUSE Bug 1199433 for CVE-2022-1651", "url": "https://bugzilla.suse.com/1199433" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1651" }, { "cve": "CVE-2022-1652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1652" } ], "notes": [ { "category": "general", "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1652", "url": "https://www.suse.com/security/cve/CVE-2022-1652" }, { "category": "external", "summary": "SUSE Bug 1199063 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1199063" }, { "category": "external", "summary": "SUSE Bug 1200057 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200057" }, { "category": "external", "summary": "SUSE Bug 1200751 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1200751" }, { "category": "external", "summary": "SUSE Bug 1201034 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201034" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212307 for CVE-2022-1652", "url": "https://bugzilla.suse.com/1212307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1652" }, { "cve": "CVE-2022-1671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1671" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1671", "url": "https://www.suse.com/security/cve/CVE-2022-1671" }, { "category": "external", "summary": "SUSE Bug 1199439 for CVE-2022-1671", "url": "https://bugzilla.suse.com/1199439" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1671" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1734" } ], "notes": [ { "category": "general", "text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1734", "url": "https://www.suse.com/security/cve/CVE-2022-1734" }, { "category": "external", "summary": "SUSE Bug 1199605 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199605" }, { "category": "external", "summary": "SUSE Bug 1199606 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1199606" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1734", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1734" }, { "cve": "CVE-2022-1789", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1789" } ], "notes": [ { "category": "general", "text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1789", "url": "https://www.suse.com/security/cve/CVE-2022-1789" }, { "category": "external", "summary": "SUSE Bug 1199674 for CVE-2022-1789", "url": "https://bugzilla.suse.com/1199674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1789" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1974" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1974", "url": "https://www.suse.com/security/cve/CVE-2022-1974" }, { "category": "external", "summary": "SUSE Bug 1200144 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200144" }, { "category": "external", "summary": "SUSE Bug 1200265 for CVE-2022-1974", "url": "https://bugzilla.suse.com/1200265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1998" } ], "notes": [ { "category": "general", "text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1998", "url": "https://www.suse.com/security/cve/CVE-2022-1998" }, { "category": "external", "summary": "SUSE Bug 1200284 for CVE-2022-1998", "url": "https://bugzilla.suse.com/1200284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-1998" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-21123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21123" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21123", "url": "https://www.suse.com/security/cve/CVE-2022-21123" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209075 for CVE-2022-21123", "url": "https://bugzilla.suse.com/1209075" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21125" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21125", "url": "https://www.suse.com/security/cve/CVE-2022-21125" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209074 for CVE-2022-21125", "url": "https://bugzilla.suse.com/1209074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21127" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21127", "url": "https://www.suse.com/security/cve/CVE-2022-21127" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21127", "url": "https://bugzilla.suse.com/1200549" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-21127" }, { "cve": "CVE-2022-21166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21166" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21166", "url": "https://www.suse.com/security/cve/CVE-2022-21166" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1209073 for CVE-2022-21166", "url": "https://bugzilla.suse.com/1209073" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21180" } ], "notes": [ { "category": "general", "text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21180", "url": "https://www.suse.com/security/cve/CVE-2022-21180" }, { "category": "external", "summary": "SUSE Bug 1199650 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1199650" }, { "category": "external", "summary": "SUSE Bug 1200549 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1200549" }, { "category": "external", "summary": "SUSE Bug 1212313 for CVE-2022-21180", "url": "https://bugzilla.suse.com/1212313" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-21180" }, { "cve": "CVE-2022-21499", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-21499" } ], "notes": [ { "category": "general", "text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-21499", "url": "https://www.suse.com/security/cve/CVE-2022-21499" }, { "category": "external", "summary": "SUSE Bug 1199426 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1199426" }, { "category": "external", "summary": "SUSE Bug 1200059 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1200059" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1203034" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212315 for CVE-2022-21499", "url": "https://bugzilla.suse.com/1212315" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2318" } ], "notes": [ { "category": "general", "text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2318", "url": "https://www.suse.com/security/cve/CVE-2022-2318" }, { "category": "external", "summary": "SUSE Bug 1201251 for CVE-2022-2318", "url": "https://bugzilla.suse.com/1201251" }, { "category": "external", "summary": "SUSE Bug 1212303 for CVE-2022-2318", "url": "https://bugzilla.suse.com/1212303" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-23222" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-23222", "url": "https://www.suse.com/security/cve/CVE-2022-23222" }, { "category": "external", "summary": "SUSE Bug 1194765 for CVE-2022-23222", "url": "https://bugzilla.suse.com/1194765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-23222" }, { "cve": "CVE-2022-26365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26365" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26365", "url": "https://www.suse.com/security/cve/CVE-2022-26365" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-26365", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-29582", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29582" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29582", "url": "https://www.suse.com/security/cve/CVE-2022-29582" }, { "category": "external", "summary": "SUSE Bug 1198811 for CVE-2022-29582", "url": "https://bugzilla.suse.com/1198811" }, { "category": "external", "summary": "SUSE Bug 1199750 for CVE-2022-29582", "url": "https://bugzilla.suse.com/1199750" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-29582" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-30594", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-30594" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-30594", "url": "https://www.suse.com/security/cve/CVE-2022-30594" }, { "category": "external", "summary": "SUSE Bug 1199505 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199505" }, { "category": "external", "summary": "SUSE Bug 1199602 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1199602" }, { "category": "external", "summary": "SUSE Bug 1201549 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1201549" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-30594", "url": "https://bugzilla.suse.com/1204132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-30594" }, { "cve": "CVE-2022-33740", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33740" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33740", "url": "https://www.suse.com/security/cve/CVE-2022-33740" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33740", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33741" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33741", "url": "https://www.suse.com/security/cve/CVE-2022-33741" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33741", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33742" } ], "notes": [ { "category": "general", "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33742", "url": "https://www.suse.com/security/cve/CVE-2022-33742" }, { "category": "external", "summary": "SUSE Bug 1200762 for CVE-2022-33742", "url": "https://bugzilla.suse.com/1200762" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33743", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33743" } ], "notes": [ { "category": "general", "text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33743", "url": "https://www.suse.com/security/cve/CVE-2022-33743" }, { "category": "external", "summary": "SUSE Bug 1200763 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1200763" }, { "category": "external", "summary": "SUSE Bug 1201629 for CVE-2022-33743", "url": "https://bugzilla.suse.com/1201629" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-33743" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64", "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-08-01T08:42:02Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
wid-sec-w-2023-1432
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-22 22:00
Summary
Siemens SIMATIC S7: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) für Automatisierungsanwendungen.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuführen, seine Privilegien zu erweitern und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1432 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json" }, { "category": "self", "summary": "WID-SEC-2023-1432 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22", "url": "https://ubuntu.com/security/notices/USN-6187-1" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html" }, { "category": "external", "summary": "Siemens Security Advisory vom 2023-06-12", "url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html" } ], "source_lang": "en-US", "title": "Siemens SIMATIC S7: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-22T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:52:18.956+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1432", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-22T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Siemens SIMATIC S7 1500 TM MFP", "product": { "name": "Siemens SIMATIC S7 1500 TM MFP", "product_id": "T028071", "product_identification_helper": { "cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp" } } } ], "category": "vendor", "name": "Siemens" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-26607", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-26607" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1077", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1073", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-1073" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0394", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0394" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0179", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2023-0179" }, { "cve": "CVE-2022-47946", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-47946" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-47520", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-47520" }, { "cve": "CVE-2022-47518", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-47518" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42722", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42722" }, { "cve": "CVE-2022-42721", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42720", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42719", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42432", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42432" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41849", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41849" }, { "cve": "CVE-2022-41674", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41674" }, { "cve": "CVE-2022-4139", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4139" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-41222", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41222" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-39190", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-39190" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3633", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3633" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3625", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3625" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-36123", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-36123" }, { "cve": "CVE-2022-3606", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3606" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3534", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3534" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-34918", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3435", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3435" }, { "cve": "CVE-2022-3303", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3303" }, { "cve": "CVE-2022-32296", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32296" }, { "cve": "CVE-2022-32250", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-32250" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-3115", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3115" }, { "cve": "CVE-2022-3104", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3104" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-30065", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-30065" }, { "cve": "CVE-2022-2978", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2978" }, { "cve": "CVE-2022-2959", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2959" }, { "cve": "CVE-2022-2905", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2905" }, { "cve": "CVE-2022-28391", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-28391" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2602", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2602" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2586", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2585", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2585" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-2327", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2327" }, { "cve": "CVE-2022-23219", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-23219" }, { "cve": "CVE-2022-23218", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-23218" }, { "cve": "CVE-2022-2274", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21505", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21505" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-21166", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21125", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21123", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-21123" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2078", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2078" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-20572", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-20572" }, { "cve": "CVE-2022-20566", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-20566" }, { "cve": "CVE-2022-20422", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20421", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-20421" }, { "cve": "CVE-2022-1882", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1882" }, { "cve": "CVE-2022-1852", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1473", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1473" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1434", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1343", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1012", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-1012" }, { "cve": "CVE-2022-0171", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2022-0171" }, { "cve": "CVE-2021-42386", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42386" }, { "cve": "CVE-2021-42385", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42385" }, { "cve": "CVE-2021-42384", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42384" }, { "cve": "CVE-2021-42383", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42383" }, { "cve": "CVE-2021-42382", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42382" }, { "cve": "CVE-2021-42381", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42381" }, { "cve": "CVE-2021-42380", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42380" }, { "cve": "CVE-2021-42379", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42379" }, { "cve": "CVE-2021-42378", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42378" }, { "cve": "CVE-2021-42377", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42377" }, { "cve": "CVE-2021-42376", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42376" }, { "cve": "CVE-2021-42375", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42375" }, { "cve": "CVE-2021-42374", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42374" }, { "cve": "CVE-2021-42373", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-42373" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-3999", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-3999" }, { "cve": "CVE-2021-3998", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-3998" }, { "cve": "CVE-2021-38604", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-38604" }, { "cve": "CVE-2021-3759", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-3759" }, { "cve": "CVE-2021-35942", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-35942" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33574", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-33574" }, { "cve": "CVE-2021-3326", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-3326" }, { "cve": "CVE-2021-28831", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-28831" }, { "cve": "CVE-2021-27645", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-27645" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2021-20269" }, { "cve": "CVE-2020-29562", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2020-29562" }, { "cve": "CVE-2020-27618", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2020-27618" }, { "cve": "CVE-2020-1752", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2020-1752" }, { "cve": "CVE-2020-10029", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2020-10029" }, { "cve": "CVE-2019-25013", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2019-25013" }, { "cve": "CVE-2018-13405", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2018-13405" }, { "cve": "CVE-2016-10228", "notes": [ { "category": "description", "text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien." } ], "product_status": { "known_affected": [ "T000126", "T028071" ] }, "release_date": "2023-06-12T22:00:00.000+00:00", "title": "CVE-2016-10228" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2024:12181-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.18.9-2.1 on GA media
Notes
Title of the patch
kernel-devel-5.18.9-2.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.18.9-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-12181
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.18.9-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.18.9-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-12181", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12181-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "kernel-devel-5.18.9-2.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:12181-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.18.9-2.1.aarch64", "product": { "name": "kernel-devel-5.18.9-2.1.aarch64", "product_id": "kernel-devel-5.18.9-2.1.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.18.9-2.1.aarch64", "product": { "name": "kernel-macros-5.18.9-2.1.aarch64", "product_id": "kernel-macros-5.18.9-2.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.18.9-2.1.aarch64", "product": { "name": "kernel-source-5.18.9-2.1.aarch64", "product_id": "kernel-source-5.18.9-2.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.18.9-2.1.aarch64", "product": { "name": "kernel-source-vanilla-5.18.9-2.1.aarch64", "product_id": "kernel-source-vanilla-5.18.9-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.18.9-2.1.ppc64le", "product": { "name": "kernel-devel-5.18.9-2.1.ppc64le", "product_id": "kernel-devel-5.18.9-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.18.9-2.1.ppc64le", "product": { "name": "kernel-macros-5.18.9-2.1.ppc64le", "product_id": "kernel-macros-5.18.9-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.18.9-2.1.ppc64le", "product": { "name": "kernel-source-5.18.9-2.1.ppc64le", "product_id": "kernel-source-5.18.9-2.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.18.9-2.1.ppc64le", "product": { "name": "kernel-source-vanilla-5.18.9-2.1.ppc64le", "product_id": "kernel-source-vanilla-5.18.9-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.18.9-2.1.s390x", "product": { "name": "kernel-devel-5.18.9-2.1.s390x", "product_id": "kernel-devel-5.18.9-2.1.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.18.9-2.1.s390x", "product": { "name": "kernel-macros-5.18.9-2.1.s390x", "product_id": "kernel-macros-5.18.9-2.1.s390x" } }, { "category": "product_version", "name": "kernel-source-5.18.9-2.1.s390x", "product": { "name": "kernel-source-5.18.9-2.1.s390x", "product_id": "kernel-source-5.18.9-2.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.18.9-2.1.s390x", "product": { "name": "kernel-source-vanilla-5.18.9-2.1.s390x", "product_id": "kernel-source-vanilla-5.18.9-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.18.9-2.1.x86_64", "product": { "name": "kernel-devel-5.18.9-2.1.x86_64", "product_id": "kernel-devel-5.18.9-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.18.9-2.1.x86_64", "product": { "name": "kernel-macros-5.18.9-2.1.x86_64", "product_id": "kernel-macros-5.18.9-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.18.9-2.1.x86_64", "product": { "name": "kernel-source-5.18.9-2.1.x86_64", "product_id": "kernel-source-5.18.9-2.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.18.9-2.1.x86_64", "product": { "name": "kernel-source-vanilla-5.18.9-2.1.x86_64", "product_id": "kernel-source-vanilla-5.18.9-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.18.9-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.aarch64" }, "product_reference": "kernel-devel-5.18.9-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.18.9-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.ppc64le" }, "product_reference": "kernel-devel-5.18.9-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.18.9-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.s390x" }, "product_reference": "kernel-devel-5.18.9-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.18.9-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.x86_64" }, "product_reference": "kernel-devel-5.18.9-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.18.9-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.aarch64" }, "product_reference": "kernel-macros-5.18.9-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.18.9-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.ppc64le" }, "product_reference": "kernel-macros-5.18.9-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.18.9-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.s390x" }, "product_reference": "kernel-macros-5.18.9-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.18.9-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.x86_64" }, "product_reference": "kernel-macros-5.18.9-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.18.9-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.aarch64" }, "product_reference": "kernel-source-5.18.9-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.18.9-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.ppc64le" }, "product_reference": "kernel-source-5.18.9-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.18.9-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.s390x" }, "product_reference": "kernel-source-5.18.9-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.18.9-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.x86_64" }, "product_reference": "kernel-source-5.18.9-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.18.9-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.aarch64" }, "product_reference": "kernel-source-vanilla-5.18.9-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.18.9-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.ppc64le" }, "product_reference": "kernel-source-vanilla-5.18.9-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.18.9-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.s390x" }, "product_reference": "kernel-source-vanilla-5.18.9-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.18.9-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.x86_64" }, "product_reference": "kernel-source-vanilla-5.18.9-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-devel-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-macros-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-5.18.9-2.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.18.9-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
opensuse-su-2022:2549-1
Vulnerability from csaf_opensuse
Published
2022-07-26 11:59
Modified
2022-07-26 11:59
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).
- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).
- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).
- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).
- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).
- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).
- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)
- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).
- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).
- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).
The following non-security bugs were fixed:
- ALSA: hda/conexant: Fix missing beep setup (git-fixes).
- ALSA: hda/realtek - Add HW8326 support (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).
- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).
- ALSA: hda/via: Fix missing beep setup (git-fixes).
- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)
- arm64: ftrace: fix branch range checks (git-fixes)
- ASoC: cs35l36: Update digital volume TLV (git-fixes).
- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).
- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).
- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).
- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).
- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).
- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).
- ASoC: wm8962: Fix suspend while playing music (git-fixes).
- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).
- ata: libata: add qc->flags in ata_qc_complete_template tracepoint (git-fixes).
- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).
- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).
- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).
- bcache: fixup multiple threads crash (git-fixes).
- bcache: improve multithreaded bch_btree_check() (git-fixes).
- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).
- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).
- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).
- bio: fix page leak bio_add_hw_page failure (git-fixes).
- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).
- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).
- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).
- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).
- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)
- blk-mq: update hctx->dispatch_busy in case of real scheduler (git-fixes).
- block: advance iov_iter on bio_add_hw_page failure (git-fixes).
- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).
- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).
- block: Fix kABI in blk-merge.c (bsc#1198020).
- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).
- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).
- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).
- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).
- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).
- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).
- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).
- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).
- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).
- cifs: avoid parallel session setups on same channel (bsc#1200217).
- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).
- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).
- cifs: call helper functions for marking channels for reconnect (bsc#1200217).
- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).
- cifs: check for smb1 in open_cached_dir() (bsc#1200217).
- cifs: check reconnects for channels of active tcons too (bsc#1200217).
- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).
- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).
- cifs: clean up an inconsistent indenting (bsc#1200217).
- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).
- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).
- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).
- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).
- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).
- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).
- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).
- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).
- cifs: fix handlecache and multiuser (bsc#1200217).
- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).
- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).
- cifs: fix minor compile warning (bsc#1200217).
- cifs: fix missed refcounting of ipc tcon (bsc#1200217).
- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).
- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).
- cifs: fix potential deadlock in direct reclaim (bsc#1200217).
- cifs: fix potential double free during failed mount (bsc#1200217).
- cifs: fix potential race with cifsd thread (bsc#1200217).
- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).
- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).
- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).
- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).
- cifs: fix the connection state transitions with multichannel (bsc#1200217).
- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).
- cifs: fix workstation_name for multiuser mounts (bsc#1200217).
- cifs: force new session setup and tcon for dfs (bsc#1200217).
- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).
- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).
- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).
- cifs: make status checks in version independent callers (bsc#1200217).
- cifs: mark sessions for reconnection in helper function (bsc#1200217).
- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).
- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).
- cifs: move superblock magic defitions to magic.h (bsc#1200217).
- cifs: potential buffer overflow in handling symlinks (bsc#1200217).
- cifs: print TIDs as hex (bsc#1200217).
- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).
- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).
- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).
- cifs: release cached dentries only if mount is complete (bsc#1200217).
- cifs: remove check of list iterator against head past the loop body (bsc#1200217).
- cifs: remove redundant assignment to pointer p (bsc#1200217).
- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).
- cifs: remove repeated state change in dfs tree connect (bsc#1200217).
- cifs: remove unused variable ses_selected (bsc#1200217).
- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).
- cifs: return the more nuanced writeback error on close() (bsc#1200217).
- cifs: sanitize multiple delimiters in prepath (bsc#1200217).
- cifs: serialize all mount attempts (bsc#1200217).
- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).
- cifs: skip trailing separators of prefix paths (bsc#1200217).
- cifs: smbd: fix typo in comment (bsc#1200217).
- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).
- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).
- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).
- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).
- cifs: update internal module number (bsc#1193629).
- cifs: update internal module number (bsc#1200217).
- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).
- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).
- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).
- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).
- cifs: use new enum for ses_status (bsc#1200217).
- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).
- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).
- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).
- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).
- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).
- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).
- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).
- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).
- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).
- drm/msm: Fix double pm_runtime_disable() call (git-fixes).
- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).
- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).
- exec: Force single empty string when argv is empty (bsc#1200571).
- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).
- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).
- ext4: fix bug_on in __es_tree_search (bsc#1200809).
- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).
- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).
- ext4: make variable 'count' signed (bsc#1200820).
- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).
- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).
- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).
- gtp: use icmp_ndo_send helper (git-fixes).
- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).
- i2c: designware: Use standard optional ref clock implementation (git-fixes).
- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).
- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).
- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).
- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).
- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).
- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).
- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).
- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).
- init: Initialize noop_backing_dev_info early (bsc#1200822).
- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).
- iomap: iomap_write_failed fix (bsc#1200829).
- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).
- jfs: fix divide error in dbNextAG (bsc#1200828).
- kABI fix of sysctl_run_estimation (git-fixes).
- kabi: nvme workaround header include (bsc#1201193).
- kabi/severities: ignore KABI for NVMe target (bsc#1192761)
- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).
- md: fix update super 1.0 on rdev size change (git-fixes).
- move devm_allocate to end of structure for kABI (git-fixes).
- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).
- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).
- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).
- net: ieee802154: ca8210: Stop leaking skb's (git-fixes).
- net: lantiq: Add locking for TX DMA channel (git-fixes).
- net: rose: fix UAF bugs caused by timer handler (git-fixes).
- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).
- net: usb: ax88179_178a: Fix packet receiving (git-fixes).
- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).
- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).
- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).
- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).
- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).
- NFS: Do not report flush errors in nfs_write_end() (git-fixes).
- NFS: Further fixes to the writeback error handling (git-fixes).
- NFS: Memory allocation failures are not server fatal errors (git-fixes).
- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm/region: Fix default alignment for small regions (git-fixes).
- nvme: add CNTRLTYPE definitions for 'identify controller' (bsc#1192761).
- nvme: Add connect option 'discovery' (bsc#1192761).
- nvme: add new discovery log page entry definitions (bsc#1192761).
- nvme: display correct subsystem NQN (bsc#1192761).
- nvme: expose subsystem type in sysfs attribute 'subsystype' (bsc#1192761).
- nvme: kabi fix nvme subsystype change (bsc#1192761)
- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).
- nvmet: add nvmet_req_subsys() helper (bsc#1192761).
- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).
- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).
- nvmet: fix freeing unallocated p2pmem (git-fixes).
- nvmet: make discovery NQN configurable (bsc#1192761).
- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).
- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).
- nvmet: register discovery subsystem as 'current' (bsc#1192761).
- nvmet: set 'CNTRLTYPE' in the identify controller data (bsc#1192761).
- nvmet: switch check for subsystem type (bsc#1192761).
- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).
- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).
- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).
- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).
- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).
- random: Add and use pr_fmt() (bsc#1184924).
- random: remove unnecessary unlikely() (bsc#1184924).
- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).
- Revert 'block: Fix a lockdep complaint triggered by request queue flushing' (git-fixes).
- scsi: core: Show SCMD_LAST in text form (git-fixes).
- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).
- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).
- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).
- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).
- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).
- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).
- scsi: lpfc: Commonize VMID code location (bsc#1201193).
- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).
- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).
- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).
- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).
- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).
- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).
- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).
- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).
- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).
- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).
- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).
- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).
- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).
- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).
- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).
- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).
- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).
- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).
- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).
- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).
- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).
- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).
- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).
- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).
- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).
- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).
- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).
- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).
- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).
- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).
- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).
- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).
- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).
- scsi: qla2xxx: Remove setting of 'req' and 'rsp' parameters (bsc#1201160).
- scsi: qla2xxx: Remove unused 'ql_dm_tgt_ex_pct' parameter (bsc#1201160).
- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).
- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).
- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).
- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).
- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).
- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).
- scsi: sd: Signal drive managed SMR disks (git-fixes).
- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).
- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).
- scsi: sd_zbc: Improve zone revalidation (git-fixes).
- scsi: sd_zbc: Remove unused inline functions (git-fixes).
- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).
- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).
- smb3: add mount parm nosparse (bsc#1200217).
- smb3: add trace point for lease not found issue (bsc#1200217).
- smb3: add trace point for oplock not found (bsc#1200217).
- smb3: check for null tcon (bsc#1200217).
- smb3: cleanup and clarify status of tree connections (bsc#1200217).
- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).
- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).
- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).
- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).
- smb3: fix snapshot mount option (bsc#1200217).
- smb3 improve error message when mount options conflict with posix (bsc#1200217).
- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).
- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).
- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).
- smb3: send NTLMSSP version information (bsc#1200217).
- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).
- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).
- SUNRPC: Fix the calculation of xdr->end in xdr_get_next_encode_buffer() (git-fixes).
- sunvnet: use icmp_ndo_send helper (git-fixes).
- tty: goldfish: Fix free_irq() on remove (git-fixes).
- usb: chipidea: udc: check request status before setting device address (git-fixes).
- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).
- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).
- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).
- usbnet: fix memory allocation in helpers (git-fixes).
- USB: serial: io_ti: add Agilent E5805A support (git-fixes).
- USB: serial: option: add Quectel EM05-G modem (git-fixes).
- USB: serial: option: add Quectel RM500K module support (git-fixes).
- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).
- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).
- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).
- veth: fix races around rq->rx_notify_masked (git-fixes).
- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).
- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).
- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).
- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).
- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).
- writeback: Avoid skipping inode writeback (bsc#1200813).
- writeback: Fix inode->i_io_list not be protected by inode->i_lock error (bsc#1200821).
- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).
- x86/entry: Remove skip_r11rcx (bsc#1201644).
Patchnames
openSUSE-Leap-Micro-5.2-2022-2549
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762) \n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).\n- smb3: fix snapshot mount option (bsc#1200217).\n- smb3 improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).\n- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n- x86/entry: Remove skip_r11rcx (bsc#1201644).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Leap-Micro-5.2-2022-2549", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_2549-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2022:2549-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2022:2549-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1179195", "url": "https://bugzilla.suse.com/1179195" }, { "category": "self", "summary": "SUSE Bug 1180814", "url": "https://bugzilla.suse.com/1180814" }, { "category": "self", "summary": "SUSE Bug 1184924", "url": "https://bugzilla.suse.com/1184924" }, { "category": "self", "summary": "SUSE Bug 1185762", "url": "https://bugzilla.suse.com/1185762" }, { "category": "self", "summary": "SUSE Bug 1192761", "url": "https://bugzilla.suse.com/1192761" }, { "category": "self", "summary": "SUSE Bug 1193629", "url": "https://bugzilla.suse.com/1193629" }, { "category": "self", "summary": "SUSE Bug 1194013", "url": "https://bugzilla.suse.com/1194013" }, { "category": "self", "summary": "SUSE Bug 1195504", "url": "https://bugzilla.suse.com/1195504" }, { "category": "self", "summary": "SUSE Bug 1195775", "url": "https://bugzilla.suse.com/1195775" }, { "category": "self", "summary": "SUSE Bug 1196901", "url": "https://bugzilla.suse.com/1196901" }, { "category": "self", "summary": "SUSE Bug 1197362", "url": "https://bugzilla.suse.com/1197362" }, { "category": "self", "summary": "SUSE Bug 1197754", "url": "https://bugzilla.suse.com/1197754" }, { "category": "self", "summary": "SUSE Bug 1198020", "url": "https://bugzilla.suse.com/1198020" }, { "category": "self", "summary": "SUSE Bug 1198924", "url": "https://bugzilla.suse.com/1198924" }, { "category": "self", "summary": "SUSE Bug 1199482", "url": "https://bugzilla.suse.com/1199482" }, { "category": "self", "summary": "SUSE Bug 1199487", "url": "https://bugzilla.suse.com/1199487" }, { "category": "self", "summary": "SUSE Bug 1199489", "url": "https://bugzilla.suse.com/1199489" }, { "category": "self", "summary": "SUSE Bug 1199657", "url": "https://bugzilla.suse.com/1199657" }, { "category": "self", "summary": "SUSE Bug 1200217", "url": "https://bugzilla.suse.com/1200217" }, { "category": "self", "summary": "SUSE Bug 1200263", "url": "https://bugzilla.suse.com/1200263" }, { "category": "self", "summary": "SUSE Bug 1200343", "url": "https://bugzilla.suse.com/1200343" }, { "category": "self", "summary": "SUSE Bug 1200442", "url": "https://bugzilla.suse.com/1200442" }, { "category": "self", "summary": "SUSE Bug 1200571", "url": "https://bugzilla.suse.com/1200571" }, { "category": "self", "summary": "SUSE Bug 1200599", "url": "https://bugzilla.suse.com/1200599" }, { "category": "self", "summary": "SUSE Bug 1200600", "url": "https://bugzilla.suse.com/1200600" }, { "category": "self", "summary": "SUSE Bug 1200604", "url": "https://bugzilla.suse.com/1200604" }, { "category": "self", "summary": "SUSE Bug 1200605", "url": "https://bugzilla.suse.com/1200605" }, { "category": "self", "summary": "SUSE Bug 1200608", "url": "https://bugzilla.suse.com/1200608" }, { "category": "self", "summary": "SUSE Bug 1200619", "url": "https://bugzilla.suse.com/1200619" }, { "category": "self", "summary": "SUSE Bug 1200622", "url": "https://bugzilla.suse.com/1200622" }, { "category": "self", "summary": "SUSE Bug 1200692", "url": "https://bugzilla.suse.com/1200692" }, { "category": "self", "summary": "SUSE Bug 1200806", "url": "https://bugzilla.suse.com/1200806" }, { "category": "self", "summary": "SUSE Bug 1200807", "url": "https://bugzilla.suse.com/1200807" }, { "category": "self", "summary": "SUSE Bug 1200809", "url": "https://bugzilla.suse.com/1200809" }, { "category": "self", "summary": "SUSE Bug 1200810", "url": "https://bugzilla.suse.com/1200810" }, { "category": "self", "summary": "SUSE Bug 1200813", "url": "https://bugzilla.suse.com/1200813" }, { "category": "self", "summary": "SUSE Bug 1200816", "url": "https://bugzilla.suse.com/1200816" }, { "category": "self", "summary": "SUSE Bug 1200820", "url": "https://bugzilla.suse.com/1200820" }, { "category": "self", "summary": "SUSE Bug 1200821", "url": "https://bugzilla.suse.com/1200821" }, { "category": "self", "summary": "SUSE Bug 1200822", "url": "https://bugzilla.suse.com/1200822" }, { "category": "self", "summary": "SUSE Bug 1200825", "url": "https://bugzilla.suse.com/1200825" }, { "category": "self", "summary": "SUSE Bug 1200828", "url": "https://bugzilla.suse.com/1200828" }, { "category": "self", "summary": "SUSE Bug 1200829", "url": "https://bugzilla.suse.com/1200829" }, { "category": "self", "summary": "SUSE Bug 1200925", "url": "https://bugzilla.suse.com/1200925" }, { "category": "self", "summary": "SUSE Bug 1201050", "url": "https://bugzilla.suse.com/1201050" }, { "category": "self", "summary": "SUSE Bug 1201080", "url": "https://bugzilla.suse.com/1201080" }, { "category": "self", "summary": "SUSE Bug 1201143", "url": "https://bugzilla.suse.com/1201143" }, { "category": "self", "summary": "SUSE Bug 1201147", "url": "https://bugzilla.suse.com/1201147" }, { "category": "self", "summary": "SUSE Bug 1201149", "url": "https://bugzilla.suse.com/1201149" }, { "category": "self", "summary": "SUSE Bug 1201160", "url": "https://bugzilla.suse.com/1201160" }, { "category": "self", "summary": "SUSE Bug 1201171", "url": "https://bugzilla.suse.com/1201171" }, { "category": "self", "summary": "SUSE Bug 1201177", "url": "https://bugzilla.suse.com/1201177" }, { "category": "self", "summary": "SUSE Bug 1201193", "url": "https://bugzilla.suse.com/1201193" }, { "category": "self", "summary": "SUSE Bug 1201222", "url": "https://bugzilla.suse.com/1201222" }, { "category": "self", "summary": "SUSE Bug 1201644", "url": "https://bugzilla.suse.com/1201644" }, { "category": "self", "summary": "SUSE Bug 1201664", "url": "https://bugzilla.suse.com/1201664" }, { "category": "self", "summary": "SUSE Bug 1201672", "url": "https://bugzilla.suse.com/1201672" }, { "category": "self", "summary": "SUSE Bug 1201673", "url": "https://bugzilla.suse.com/1201673" }, { "category": "self", "summary": "SUSE Bug 1201676", "url": "https://bugzilla.suse.com/1201676" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26341 page", "url": "https://www.suse.com/security/cve/CVE-2021-26341/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-4157 page", "url": "https://www.suse.com/security/cve/CVE-2021-4157/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1012 page", "url": "https://www.suse.com/security/cve/CVE-2022-1012/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20132 page", "url": "https://www.suse.com/security/cve/CVE-2022-20132/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20141 page", "url": "https://www.suse.com/security/cve/CVE-2022-20141/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-20154 page", "url": "https://www.suse.com/security/cve/CVE-2022-20154/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-33981 page", "url": "https://www.suse.com/security/cve/CVE-2022-33981/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2022-07-26T11:59:18Z", "generator": { "date": "2022-07-26T11:59:18Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2022:2549-1", "initial_release_date": "2022-07-26T11:59:18Z", "revision_history": [ { "date": "2022-07-26T11:59:18Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.aarch64", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64", "product_id": "kernel-default-5.3.18-150300.59.87.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-5.3.18-150300.59.87.1.x86_64", "product": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64", "product_id": "kernel-default-5.3.18-150300.59.87.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap Micro 5.2", "product": { "name": "openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap-micro:5.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64" }, "product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap Micro 5.2", "product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64", "relates_to_product_reference": "openSUSE Leap Micro 5.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26341", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26341" } ], "notes": [ { "category": "general", "text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26341", "url": "https://www.suse.com/security/cve/CVE-2021-26341" }, { "category": "external", "summary": "SUSE Bug 1191580 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1191580" }, { "category": "external", "summary": "SUSE Bug 1196901 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1196901" }, { "category": "external", "summary": "SUSE Bug 1201050 for CVE-2021-26341", "url": "https://bugzilla.suse.com/1201050" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2021-26341" }, { "cve": "CVE-2021-4157", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-4157" } ], "notes": [ { "category": "general", "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-4157", "url": "https://www.suse.com/security/cve/CVE-2021-4157" }, { "category": "external", "summary": "SUSE Bug 1194013 for CVE-2021-4157", "url": "https://bugzilla.suse.com/1194013" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2021-4157" }, { "cve": "CVE-2022-1012", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1012" } ], "notes": [ { "category": "general", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1012", "url": "https://www.suse.com/security/cve/CVE-2022-1012" }, { "category": "external", "summary": "SUSE Bug 1199482 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199482" }, { "category": "external", "summary": "SUSE Bug 1199694 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1199694" }, { "category": "external", "summary": "SUSE Bug 1202335 for CVE-2022-1012", "url": "https://bugzilla.suse.com/1202335" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-20132", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20132" } ], "notes": [ { "category": "general", "text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20132", "url": "https://www.suse.com/security/cve/CVE-2022-20132" }, { "category": "external", "summary": "SUSE Bug 1200619 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1200619" }, { "category": "external", "summary": "SUSE Bug 1212287 for CVE-2022-20132", "url": "https://bugzilla.suse.com/1212287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20141" } ], "notes": [ { "category": "general", "text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20141", "url": "https://www.suse.com/security/cve/CVE-2022-20141" }, { "category": "external", "summary": "SUSE Bug 1200604 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200604" }, { "category": "external", "summary": "SUSE Bug 1200605 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1200605" }, { "category": "external", "summary": "SUSE Bug 1203034 for CVE-2022-20141", "url": "https://bugzilla.suse.com/1203034" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "important" } ], "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-20154" } ], "notes": [ { "category": "general", "text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-20154", "url": "https://www.suse.com/security/cve/CVE-2022-20154" }, { "category": "external", "summary": "SUSE Bug 1200599 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200599" }, { "category": "external", "summary": "SUSE Bug 1200608 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1200608" }, { "category": "external", "summary": "SUSE Bug 1224298 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224298" }, { "category": "external", "summary": "SUSE Bug 1224878 for CVE-2022-20154", "url": "https://bugzilla.suse.com/1224878" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "important" } ], "title": "CVE-2022-20154" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-33981", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-33981" } ], "notes": [ { "category": "general", "text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-33981", "url": "https://www.suse.com/security/cve/CVE-2022-33981" }, { "category": "external", "summary": "SUSE Bug 1200692 for CVE-2022-33981", "url": "https://bugzilla.suse.com/1200692" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "moderate" } ], "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64", "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64", "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2022-07-26T11:59:18Z", "details": "important" } ], "title": "CVE-2022-34918" } ] }
ghsa-9v26-h3ph-p8v7
Vulnerability from github
Published
2022-07-05 00:00
Modified
2022-07-14 00:00
Severity ?
VLAI Severity ?
Details
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
{ "affected": [], "aliases": [ "CVE-2022-34918" ], "database_specific": { "cwe_ids": [ "CWE-843" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-07-04T21:15:00Z", "severity": "HIGH" }, "details": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "id": "GHSA-9v26-h3ph-p8v7", "modified": "2022-07-14T00:00:21Z", "published": "2022-07-05T00:00:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "type": "WEB", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220826-0004" }, { "type": "WEB", "url": "https://www.debian.org/security/2022/dsa-5191" }, { "type": "WEB", "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "type": "WEB", "url": "https://www.randorisec.fr/crack-linux-firewall" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
ssa-794697
Vulnerability from csaf_siemens
Published
2023-06-13 00:00
Modified
2024-04-09 00:00
Summary
SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1
Notes
Summary
Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.
Siemens has released a new version for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem and recommends to update to the latest version.
This advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (
https://cert-portal.siemens.com/productcert/html/ssa-265688.html).
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem and recommends to update to the latest version.\n\nThis advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-265688.html).", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html" }, { "category": "self", "summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794697.json" }, { "category": "self", "summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794697.pdf" }, { "category": "self", "summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-794697.txt" } ], "title": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1", "tracking": { "current_release_date": "2024-04-09T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-794697", "initial_release_date": "2023-06-13T00:00:00Z", "revision_history": [ { "date": "2023-06-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2023-07-11T00:00:00Z", "legacy_version": "1.1", "number": "2", "summary": "Added CVE-2022-4269, CVE-2023-3141, CVE-2023-3268, CVE-2023-31436, CVE-2023-32233" }, { "date": "2023-08-08T00:00:00Z", "legacy_version": "1.2", "number": "3", "summary": "Added CVE-2023-3446, CVE-2023-3389, CVE-2022-1015, \r\nCVE-2023-3609" }, { "date": "2023-09-12T00:00:00Z", "legacy_version": "1.3", "number": "4", "summary": "Added CVE-2023-3338" }, { "date": "2023-11-14T00:00:00Z", "legacy_version": "1.4", "number": "5", "summary": "Added CVE-2023-1206, CVE-2023-2898, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3773, CVE-2023-3777, CVE-2023-4004, CVE-2023-4015, CVE-2023-4273, CVE-2023-4623, CVE-2023-4921, CVE-2023-35001, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42753, CVE-2023-42755" }, { "date": "2023-12-12T00:00:00Z", "legacy_version": "1.5", "number": "6", "summary": "Added CVE-2021-44879, CVE-2023-5178, CVE-2023-5197, CVE-2023-5678, CVE-2023-5717, CVE-2023-31085, CVE-2023-35827, CVE-2023-39189, CVE-2023-42754, CVE-2023-45863, CVE-2023-45871" }, { "date": "2024-01-09T00:00:00Z", "legacy_version": "1.6", "number": "7", "summary": "Added CVE-2023-48795" }, { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.7", "number": "8", "summary": "Added CVE-2020-12762, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-36660, CVE-2023-50495, CVE-2023-51384, CVE-2023-51385, CVE-2023-51767, CVE-2024-0232, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-0684, CVE-2024-22365, CVE-2024-25062" }, { "date": "2024-04-09T00:00:00Z", "legacy_version": "1.8", "number": "9", "summary": "Added fix for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem" } ], "status": "interim", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV1.1", "product": { "name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem", "product_id": "1" } } ], "category": "product_name", "name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-12762", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-12762" }, { "cve": "CVE-2021-3759", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-4037", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-4037" }, { "cve": "CVE-2021-33655", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33655" }, { "cve": "CVE-2021-44879", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-44879" }, { "cve": "CVE-2022-0171", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-0171" }, { "cve": "CVE-2022-1012", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1012" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-1184", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1292", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1343", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1343" }, { "cve": "CVE-2022-1434", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1434" }, { "cve": "CVE-2022-1462", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1473", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1473" }, { "cve": "CVE-2022-1679", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1852", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1882", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-1882" }, { "cve": "CVE-2022-2068", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2078", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2078" }, { "cve": "CVE-2022-2097", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2097" }, { "cve": "CVE-2022-2153", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2153" }, { "cve": "CVE-2022-2274", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2274" }, { "cve": "CVE-2022-2327", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2327" }, { "cve": "CVE-2022-2503", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2503" }, { "cve": "CVE-2022-2586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2602", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel. A race issue occurs between an io_uring request and the Unix socket garbage collector, allowing an attacker local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2602" }, { "cve": "CVE-2022-2663", "cwe": { "id": "CWE-923", "name": "Improper Restriction of Communication Channel to Intended Endpoints" }, "notes": [ { "category": "summary", "text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2663" }, { "cve": "CVE-2022-2905", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2905" }, { "cve": "CVE-2022-2959", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2959" }, { "cve": "CVE-2022-2978", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-2978" }, { "cve": "CVE-2022-3028", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3104", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3104" }, { "cve": "CVE-2022-3115", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3115" }, { "cve": "CVE-2022-3169", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3169" }, { "cve": "CVE-2022-3303", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3303" }, { "cve": "CVE-2022-3521", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3524" }, { "cve": "CVE-2022-3534", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3534" }, { "cve": "CVE-2022-3545", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3594", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3606", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3606" }, { "cve": "CVE-2022-3621", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3625", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3625" }, { "cve": "CVE-2022-3628", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3629", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3633", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3633" }, { "cve": "CVE-2022-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3646", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "summary", "text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-3649" }, { "cve": "CVE-2022-4095", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4095" }, { "cve": "CVE-2022-4129", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4139", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4139" }, { "cve": "CVE-2022-4269", "cwe": { "id": "CWE-833", "name": "Deadlock" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4269" }, { "cve": "CVE-2022-4304", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4304" }, { "cve": "CVE-2022-4450", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4662", "cwe": { "id": "CWE-455", "name": "Non-exit on Failed Initialization" }, "notes": [ { "category": "summary", "text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-4662" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20566", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20566" }, { "cve": "CVE-2022-20572", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20572" }, { "cve": "CVE-2022-21123", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21123" }, { "cve": "CVE-2022-21125", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21125" }, { "cve": "CVE-2022-21166", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "notes": [ { "category": "summary", "text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21166" }, { "cve": "CVE-2022-21505", "cwe": { "id": "CWE-305", "name": "Authentication Bypass by Primary Weakness" }, "notes": [ { "category": "summary", "text": "A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-21505" }, { "cve": "CVE-2022-26373", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-26373" }, { "cve": "CVE-2022-32250", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-32250" }, { "cve": "CVE-2022-32296", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-32296" }, { "cve": "CVE-2022-34918", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-36123", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-36123" }, { "cve": "CVE-2022-36280", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-36280" }, { "cve": "CVE-2022-36879", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-36946" }, { "cve": "CVE-2022-39188", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39190", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-39190" }, { "cve": "CVE-2022-40307", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40768", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-40768" }, { "cve": "CVE-2022-41218", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41222", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41222" }, { "cve": "CVE-2022-41674", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-41849", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41849" }, { "cve": "CVE-2022-41850", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-41850" }, { "cve": "CVE-2022-42328", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42432", "cwe": { "id": "CWE-457", "name": "Use of Uninitialized Variable" }, "notes": [ { "category": "summary", "text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42432" }, { "cve": "CVE-2022-42703", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42719", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-42895", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-42896" }, { "cve": "CVE-2022-43750", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-43750" }, { "cve": "CVE-2022-47518", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47518" }, { "cve": "CVE-2022-47520", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47520" }, { "cve": "CVE-2022-47929", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47929" }, { "cve": "CVE-2022-47946", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-47946" }, { "cve": "CVE-2023-0215", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0464", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-1077", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-1077" }, { "cve": "CVE-2023-1095", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-2898", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-2898" }, { "cve": "CVE-2023-3141", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3268", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3268" }, { "cve": "CVE-2023-3338", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A null pointer dereference flaw was found in the Linux kernel\u0027s DECnet networking protocol. This issue could allow a remote user to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3338" }, { "cve": "CVE-2023-3389", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\r\n\r\nWe recommend upgrading past commit `ef7dfac51d8ed961b742218f526bd589f3900a59` \r\n(`4716c73b188566865bdd79c3a6709696a224ac04` for 5.10 stable and \r\n`0e388fce7aec40992eadee654193cad345d62663` for 5.15 stable).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3389" }, { "cve": "CVE-2023-3446", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3446" }, { "cve": "CVE-2023-3609", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3609" }, { "cve": "CVE-2023-3610", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3610" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3772", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3772" }, { "cve": "CVE-2023-3773", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3773" }, { "cve": "CVE-2023-3777", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-3777" }, { "cve": "CVE-2023-4004", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4004" }, { "cve": "CVE-2023-4015", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4015" }, { "cve": "CVE-2023-4273", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4273" }, { "cve": "CVE-2023-4623", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-4911", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4911" }, { "cve": "CVE-2023-4921", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-4921" }, { "cve": "CVE-2023-5178", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5178" }, { "cve": "CVE-2023-5197", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\r\n\r\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5197" }, { "cve": "CVE-2023-5678", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5678" }, { "cve": "CVE-2023-5717", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-5717" }, { "cve": "CVE-2023-6606", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6931", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-6931" }, { "cve": "CVE-2023-6932", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-6932" }, { "cve": "CVE-2023-7008", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-7008" }, { "cve": "CVE-2023-7104", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-7104" }, { "cve": "CVE-2023-23454", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-23559" }, { "cve": "CVE-2023-26607", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-26607" }, { "cve": "CVE-2023-31085", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-31085" }, { "cve": "CVE-2023-31436", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-31436" }, { "cve": "CVE-2023-32233", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-32233" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35827", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-35827" }, { "cve": "CVE-2023-36660", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-36660" }, { "cve": "CVE-2023-37453", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-37453" }, { "cve": "CVE-2023-39189", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-39189" }, { "cve": "CVE-2023-39192", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-39194", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-39194" }, { "cve": "CVE-2023-42753", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42755", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-42755" }, { "cve": "CVE-2023-45863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45863" }, { "cve": "CVE-2023-45871", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-45871" }, { "cve": "CVE-2023-48795", "cwe": { "id": "CWE-222", "name": "Truncation of Security-relevant Information" }, "notes": [ { "category": "summary", "text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-48795" }, { "cve": "CVE-2023-50495", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-50495" }, { "cve": "CVE-2023-51384", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-51384" }, { "cve": "CVE-2023-51385", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-51385" }, { "cve": "CVE-2023-51767", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2023-51767" }, { "cve": "CVE-2024-0232", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0232" }, { "cve": "CVE-2024-0553", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0553" }, { "cve": "CVE-2024-0567", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0567" }, { "cve": "CVE-2024-0584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0584" }, { "cve": "CVE-2024-0684", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-0684" }, { "cve": "CVE-2024-22365", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-22365" }, { "cve": "CVE-2024-25062", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V1.1 or later version", "product_ids": [ "1" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/" }, { "category": "workaround", "details": "Only build and run applications from trusted sources", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2024-25062" } ] }
ssa-806742
Vulnerability from csaf_siemens
Published
2024-02-13 00:00
Modified
2024-02-13 00:00
Summary
SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4
Notes
Summary
SCALANCE XCM-/XRM-300 before V2.4 is affected by multiple vulnerabilities.
Siemens has released an update for SCALANCE X-300 and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SCALANCE XCM-/XRM-300 before V2.4 is affected by multiple vulnerabilities.\n\nSiemens has released an update for SCALANCE X-300 and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-806742.html" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-806742.json" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-806742.pdf" }, { "category": "self", "summary": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-806742.txt" } ], "title": "SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4", "tracking": { "current_release_date": "2024-02-13T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-806742", "initial_release_date": "2024-02-13T00:00:00Z", "revision_history": [ { "date": "2024-02-13T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2EC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCH328 (6GK5328-4TS01-2EC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)", "product_id": "2", "product_identification_helper": { "model_numbers": [ "6GK5324-8TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM324 (6GK5324-8TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)", "product_id": "3", "product_identification_helper": { "model_numbers": [ "6GK5328-4TS01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM328 (6GK5328-4TS01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)", "product_id": "4", "product_identification_helper": { "model_numbers": [ "6GK5332-0GA01-2AC2" ] } } } ], "category": "product_name", "name": "SCALANCE XCM332 (6GK5332-0GA01-2AC2)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)", "product_id": "5", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2ER3" ] } } } ], "category": "product_name", "name": "SCALANCE XRH334 (24 V DC, 8xFO, CC) (6GK5334-2TS01-2ER3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)", "product_id": "6", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 8xFO) (6GK5334-2TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)", "product_id": "7", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-4AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (2x230 V AC, 12xFO) (6GK5334-3TS01-4AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)", "product_id": "8", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 8xFO) (6GK5334-2TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)", "product_id": "9", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-2AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (24 V DC, 12xFO) (6GK5334-3TS01-2AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)", "product_id": "10", "product_identification_helper": { "model_numbers": [ "6GK5334-2TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 8xFO) (6GK5334-2TS01-3AR3)" }, { "branches": [ { "category": "product_version_range", "name": "\u003cV2.4", "product": { "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)", "product_id": "11", "product_identification_helper": { "model_numbers": [ "6GK5334-3TS01-3AR3" ] } } } ], "category": "product_name", "name": "SCALANCE XRM334 (230 V AC, 12xFO) (6GK5334-3TS01-3AR3)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-20001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2006-20001" }, { "cve": "CVE-2020-10735", "cwe": { "id": "CWE-704", "name": "Incorrect Type Conversion or Cast" }, "notes": [ { "category": "summary", "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2020-10735" }, { "cve": "CVE-2021-3445", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "summary", "text": "A flaw was found in libdnf\u0027s signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-3445" }, { "cve": "CVE-2021-3638", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-3638" }, { "cve": "CVE-2021-4037", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-4037" }, { "cve": "CVE-2021-36369", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-36369" }, { "cve": "CVE-2021-43666", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password\u0027s length is 0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-43666" }, { "cve": "CVE-2021-45451", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "summary", "text": "In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2021-45451" }, { "cve": "CVE-2022-1015", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-1015" }, { "cve": "CVE-2022-1348", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-1348" }, { "cve": "CVE-2022-2586", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-2586" }, { "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-2880" }, { "cve": "CVE-2022-3294", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Users may have access to secure endpoints in the control plane network. Kubernetes clusters are only affected if an untrusted user can modify Node objects and send proxy requests to them. Kubernetes supports node proxying, which allows clients of kube-apiserver to access endpoints of a Kubelet to establish connections to Pods, retrieve container logs, and more. While Kubernetes already validates the proxying address for Nodes, a bug in kube-apiserver made it possible to bypass this validation. Bypassing this validation could allow authenticated requests destined for Nodes to to the API server\u0027s private network.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3294" }, { "cve": "CVE-2022-3437", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3437" }, { "cve": "CVE-2022-3515", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-3515" }, { "cve": "CVE-2022-4415", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4743", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A potential memory leak issue was discovered in SDL2 in GLES_CreateTexture() function in SDL_render_gles.c. The vulnerability allows an attacker to cause a denial of service attack. The vulnerability affects SDL2 v2.0.4 and above. SDL-1.x are not affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4743" }, { "cve": "CVE-2022-4744", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double-free flaw was found in the Linux kernel\u2019s TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4744" }, { "cve": "CVE-2022-4900", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4900" }, { "cve": "CVE-2022-4904", "cwe": { "id": "CWE-1284", "name": "Improper Validation of Specified Quantity in Input" }, "notes": [ { "category": "summary", "text": "A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-4904" }, { "cve": "CVE-2022-23471", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "containerd is an open source container runtime. A bug was found in containerd\u0027s CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user\u0027s process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd\u0027s CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-23521" }, { "cve": "CVE-2022-24834", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-24834" }, { "cve": "CVE-2022-26691", "cwe": { "id": "CWE-697", "name": "Incorrect Comparison" }, "notes": [ { "category": "summary", "text": "A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-26691" }, { "cve": "CVE-2022-28737", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "There\u0027s a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28737" }, { "cve": "CVE-2022-28738", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28738" }, { "cve": "CVE-2022-28739", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-28739" }, { "cve": "CVE-2022-29154", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29154" }, { "cve": "CVE-2022-29162", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "summary", "text": "runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container\u0027s bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "cwe": { "id": "CWE-282", "name": "Improper Ownership Management" }, "notes": [ { "category": "summary", "text": "Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29187" }, { "cve": "CVE-2022-29536", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In GNOME Epiphany before 41.4 and 42.x before 42.2, an HTML document can trigger a client buffer overflow (in ephy_string_shorten in the UI process) via a long page title. The issue occurs because the number of bytes for a UTF-8 ellipsis character is not properly considered.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-29536" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-32148" }, { "cve": "CVE-2022-34903", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim\u0027s keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-34903" }, { "cve": "CVE-2022-34918", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-36021", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36021" }, { "cve": "CVE-2022-36227", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36760", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027) vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-36760" }, { "cve": "CVE-2022-37436", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "notes": [ { "category": "summary", "text": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37454", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37454" }, { "cve": "CVE-2022-37797", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In lighttpd 1.4.65, mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received. It leads to null pointer dereference which crashes the server. It could be used by an external attacker to cause denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-37797" }, { "cve": "CVE-2022-38725", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service via crafted syslog input that is mishandled by the tcp or network function. syslog-ng Premium Edition 7.0.30 and syslog-ng Store Box 6.10.0 are also affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-38725" }, { "cve": "CVE-2022-39189", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-39189" }, { "cve": "CVE-2022-39260", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git\u0027s push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-39260" }, { "cve": "CVE-2022-41409", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41409" }, { "cve": "CVE-2022-41556", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "notes": [ { "category": "summary", "text": "A resource leak in gw_backend.c in lighttpd 1.4.56 through 1.4.66 could lead to a denial of service (connection-slot exhaustion) after a large amount of anomalous TCP behavior by clients. It is related to RDHUP mishandling in certain HTTP/1.1 chunked situations. Use of mod_fastcgi is, for example, affected. This is fixed in 1.4.67.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41556" }, { "cve": "CVE-2022-41715", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41723", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41723" }, { "cve": "CVE-2022-41860", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the server will try to look that option up in the internal dictionaries. This lookup will fail, but the SIM code will not check for that failure. Instead, it will dereference a NULL pointer, and cause the server to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41860" }, { "cve": "CVE-2022-41861", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41861" }, { "cve": "CVE-2022-41862", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41862" }, { "cve": "CVE-2022-41903", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-41903" }, { "cve": "CVE-2022-42919", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-42919" }, { "cve": "CVE-2022-44370", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "NASM v2.16 was discovered to contain a heap buffer overflow in the component quote_for_pmake() asm/nasm.c:856", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-44370" }, { "cve": "CVE-2022-45061", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45142", "cwe": { "id": "CWE-354", "name": "Improper Validation of Integrity Check Value" }, "notes": [ { "category": "summary", "text": "The fix for CVE-2022-3437 included changing memcmp to be constant time and a workaround for a compiler bug by adding \"!= 0\" comparisons to the result of memcmp. When these patches were backported to the heimdal-7.7.1 and heimdal-7.8.0 branches (and possibly other branches) a logic inversion sneaked in causing the validation of message integrity codes in gssapi/arcfour to be inverted.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45142" }, { "cve": "CVE-2022-45919", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-46392", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-46392" }, { "cve": "CVE-2022-46393", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX \u003e 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-46393" }, { "cve": "CVE-2022-47629", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-47629" }, { "cve": "CVE-2022-48303", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-48303" }, { "cve": "CVE-2022-48434", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2022-48434" }, { "cve": "CVE-2023-0160", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A deadlock flaw was found in the Linux kernel\u2019s BPF subsystem. This flaw allows a local user to potentially crash the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0160" }, { "cve": "CVE-2023-0330", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0330" }, { "cve": "CVE-2023-0361", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "notes": [ { "category": "summary", "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0361" }, { "cve": "CVE-2023-0494", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0494" }, { "cve": "CVE-2023-0567", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0568", "cwe": { "id": "CWE-131", "name": "Incorrect Calculation of Buffer Size" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0662", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-0662" }, { "cve": "CVE-2023-1206", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1206" }, { "cve": "CVE-2023-1380", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1393", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1393" }, { "cve": "CVE-2023-1611", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1838", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1838" }, { "cve": "CVE-2023-1855", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1859", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1859" }, { "cve": "CVE-2023-1989", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in ndlc_remove in drivers/nfc/st-nci/ndlc.c in the Linux Kernel. This flaw could allow an attacker to crash the system due to a race problem.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-1990" }, { "cve": "CVE-2023-2002", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2002" }, { "cve": "CVE-2023-2124", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u2019s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2194", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability was found in the Linux kernel\u0027s SLIMpro I2C device driver. The userspace \"data-\u003eblock[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2194" }, { "cve": "CVE-2023-2269", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2269" }, { "cve": "CVE-2023-2861", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2861" }, { "cve": "CVE-2023-2953", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-2953" }, { "cve": "CVE-2023-3006", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "notes": [ { "category": "summary", "text": "A known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, becomes actual again for the new hw AmpereOne. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within the victim\u0027s hardware context. Once that occurs, speculation caused by the mispredicted branches can cause cache allocation. This issue leads to obtaining information that should not be accessible.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3006" }, { "cve": "CVE-2023-3090", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb-\u003ecb initialization in the ipvlan network driver. The vulnerability is reachable if\u00a0CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3090" }, { "cve": "CVE-2023-3111", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3111" }, { "cve": "CVE-2023-3141", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3212", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3212" }, { "cve": "CVE-2023-3247", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "notes": [ { "category": "summary", "text": "In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client\u0027s nonce.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3247" }, { "cve": "CVE-2023-3268", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3268" }, { "cve": "CVE-2023-3301", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3301" }, { "cve": "CVE-2023-3316", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3316" }, { "cve": "CVE-2023-3390", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability was found in the Linux kernel\u0027s netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit\u00a01240eb93f0616b21c675416516ff3d74798fdc97.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3390" }, { "cve": "CVE-2023-3611", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3611" }, { "cve": "CVE-2023-3776", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_fw component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3776" }, { "cve": "CVE-2023-3863", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free flaw was found in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC in the Linux kernel. This flaw allows a local user with special privileges to impact a kernel information leak issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-3863" }, { "cve": "CVE-2023-4128", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use-after-free vulnerability in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4194", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-20593", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue in \u201cZen 2\u201d CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-21255", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In multiple functions of binder.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-21255" }, { "cve": "CVE-2023-22490", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "summary", "text": "Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim\u0027s filesystem within the malicious repository\u0027s working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.\n\nA fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22742", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "summary", "text": "libgit2 is a cross-platform, linkable library implementation of Git. When using an SSH remote with the optional libssh2 backend, libgit2 does not perform certificate checking by default. Prior versions of libgit2 require the caller to set the `certificate_check` field of libgit2\u0027s `git_remote_callbacks` structure - if a certificate check callback is not set, libgit2 does not perform any certificate checking. This means that by default - without configuring a certificate check callback, clients will not perform validation on the server SSH keys and may be subject to a man-in-the-middle attack. Users are encouraged to upgrade to v1.4.5 or v1.5.1. Users unable to upgrade should ensure that all relevant certificates are manually checked.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22742" }, { "cve": "CVE-2023-22745", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In affected versions `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-22745" }, { "cve": "CVE-2023-23454", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "summary", "text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23931", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23931" }, { "cve": "CVE-2023-23934", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Werkzeug is a comprehensive WSGI web application library. Browsers may allow \"nameless\" cookies that look like `=value` instead of `key=value`. A vulnerable browser may allow a compromised application on an adjacent subdomain to exploit this to set a cookie like `=__Host-test=bad` for another subdomain. Werkzeug prior to 2.2.3 will parse the cookie `=__Host-test=bad` as __Host-test=bad`. If a Werkzeug application is running next to a vulnerable or malicious subdomain which sets such a cookie using a vulnerable browser, the Werkzeug application will see the bad cookie value but the valid cookie key. The issue is fixed in Werkzeug 2.2.3.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23934" }, { "cve": "CVE-2023-23946", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24538", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-24538" }, { "cve": "CVE-2023-25153", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "containerd is an open source container runtime. Before versions 1.6.18 and 1.5.18, when importing an OCI image, there was no limit on the number of bytes read for certain files. A maliciously crafted image with a large file where a limit was not applied could cause a denial of service. This bug has been fixed in containerd 1.6.18 and 1.5.18. Users should update to these versions to resolve the issue. As a workaround, ensure that only trusted images are used and that only trusted users have permissions to import images.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25153" }, { "cve": "CVE-2023-25155", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25155" }, { "cve": "CVE-2023-25193", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger quadratic growth via consecutive marks during the process of looking back for base glyphs when attaching marks.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25588", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "A flaw was found in Binutils. The field `the_bfd` of `asymbol`struct is uninitialized in the `bfd_mach_o_get_synthetic_symtab` function, which may lead to an application crash and local denial of service.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25588" }, { "cve": "CVE-2023-25690", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\r\n\r\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. \r\n\r\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25727", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "summary", "text": "In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-25727" }, { "cve": "CVE-2023-26081", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-26081" }, { "cve": "CVE-2023-26965", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-26965" }, { "cve": "CVE-2023-27522", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "notes": [ { "category": "summary", "text": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27522" }, { "cve": "CVE-2023-27534", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "summary", "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-27536" }, { "cve": "CVE-2023-28450", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28450" }, { "cve": "CVE-2023-28466", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28466" }, { "cve": "CVE-2023-28486", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "Sudo before 1.9.13 does not escape control characters in log messages.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "Sudo before 1.9.13 does not escape control characters in sudoreplay output.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-28487" }, { "cve": "CVE-2023-29402", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via \"go get\", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29404", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "The go command may execute arbitrary code at build time when using cgo. This may occur when running \"go get\" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a \"#cgo LDFLAGS\" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29405" }, { "cve": "CVE-2023-29406", "cwe": { "id": "CWE-436", "name": "Interpretation Conflict" }, "notes": [ { "category": "summary", "text": "The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to \u003c= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-29409" }, { "cve": "CVE-2023-30086", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30086" }, { "cve": "CVE-2023-30456", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30456" }, { "cve": "CVE-2023-30772", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/power/supply/da9150-charger.c if a physically proximate attacker unplugs a device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-31124", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31124" }, { "cve": "CVE-2023-31130", "cwe": { "id": "CWE-124", "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular \"0::00:00:00/2\" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31130" }, { "cve": "CVE-2023-31147", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31147" }, { "cve": "CVE-2023-31436", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31489", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-31489" }, { "cve": "CVE-2023-32067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32067" }, { "cve": "CVE-2023-32233", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32233" }, { "cve": "CVE-2023-32573", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "notes": [ { "category": "summary", "text": "In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-32573" }, { "cve": "CVE-2023-33203", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-33203" }, { "cve": "CVE-2023-34256", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "** DISPUTED ** An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated \"When modifying the block device while it is mounted by the filesystem\" access.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34256" }, { "cve": "CVE-2023-34872", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "A vulnerability in Outline.cc for Poppler prior to 23.06.0 allows a remote attacker to cause a Denial of Service (DoS) (crash) via a crafted PDF file in OutlineItem::open.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34872" }, { "cve": "CVE-2023-34969", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-34969" }, { "cve": "CVE-2023-35001", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35001" }, { "cve": "CVE-2023-35788", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35788" }, { "cve": "CVE-2023-35789", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35789" }, { "cve": "CVE-2023-35823", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35823" }, { "cve": "CVE-2023-35824", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35824" }, { "cve": "CVE-2023-35828", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-35828" }, { "cve": "CVE-2023-36054", "cwe": { "id": "CWE-824", "name": "Access of Uninitialized Pointer" }, "notes": [ { "category": "summary", "text": "lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36054" }, { "cve": "CVE-2023-36617", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "notes": [ { "category": "summary", "text": "A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36617" }, { "cve": "CVE-2023-36664", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-36664" }, { "cve": "CVE-2023-37920", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "notes": [ { "category": "summary", "text": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes \"e-Tugra\" root certificates. e-Tugra\u0027s root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from \"e-Tugra\" from the root store.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-37920" }, { "cve": "CVE-2023-38559", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-38559" }, { "cve": "CVE-2023-40283", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.", "title": "Summary" } ], "product_status": { "known_affected": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "1", "2", "3", "5", "11", "10", "9", "8", "7", "6" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" }, { "category": "vendor_fix", "details": "Update to V2.4 or later version", "product_ids": [ "4" ], "url": "https://support.industry.siemens.com/cs/ww/en/view/109826613/" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1", "2", "3", "4", "5", "11", "10", "9", "8", "7", "6" ] } ], "title": "CVE-2023-40283" } ] }
rhsa-2022:6592
Vulnerability from csaf_redhat
Published
2022-09-20 12:18
Modified
2025-02-06 14:34
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6592", "url": "https://access.redhat.com/errata/RHSA-2022:6592" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6592.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2025-02-06T14:34:37+00:00", "generator": { "date": "2025-02-06T14:34:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.3.0" } }, "id": "RHSA-2022:6592", "initial_release_date": "2022-09-20T12:18:48+00:00", "revision_history": [ { "date": "2022-09-20T12:18:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-20T12:18:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-02-06T14:34:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-2.el9_0?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-1.el9_0?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-1.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-2.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-2.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-2.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-1.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-2.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-2.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-2.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1@1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debugsource@1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_17_1-debuginfo@1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1@1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debugsource@1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "product": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "product_id": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_22_1-debuginfo@1-1.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64" }, "product_reference": "kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Arthur Mongodin" ], "organization": "RandoriSec" } ], "cve": "CVE-2022-34918", "cwe": { "id": "CWE-1025", "name": "Comparison Using Wrong Factors" }, "discovery_date": "2022-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104423" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the Linux kernel\u2019s Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in nft_set_elem_init()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "RHBZ#2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34918", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/", "url": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/" }, { "category": "external", "summary": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/" } ], "release_date": "2022-07-02T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-20T12:18:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6592" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-2.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_17_1-debugsource-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debuginfo-0:1-1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_22_1-debugsource-0:1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap overflow in nft_set_elem_init()" } ] }
rhsa-2022:6582
Vulnerability from csaf_redhat
Published
2022-09-20 13:37
Modified
2025-07-25 18:56
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)
* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the latest RHEL-9.0.z3 Batch (BZ#2119577)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)\n\n* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z3 Batch (BZ#2119577)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6582", "url": "https://access.redhat.com/errata/RHSA-2022:6582" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2096178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178" }, { "category": "external", "summary": "2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6582.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-07-25T18:56:02+00:00", "generator": { "date": "2025-07-25T18:56:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.4" } }, "id": "RHSA-2022:6582", "initial_release_date": "2022-09-20T13:37:53+00:00", "revision_history": [ { "date": "2022-09-20T13:37:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-20T13:37:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-25T18:56:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "product": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "product_id": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.26.1.rt21.98.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.26.1.rt21.98.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)", "product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src" }, "product_reference": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)", "product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2078", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-06-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2096178" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in nft_set_desc_concat_parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2078" }, { "category": "external", "summary": "RHBZ#2096178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2078", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2078" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85" } ], "release_date": "2022-05-31T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-20T13:37:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6582" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in nft_set_desc_concat_parse()" }, { "acknowledgments": [ { "names": [ "Arthur Mongodin" ], "organization": "RandoriSec" } ], "cve": "CVE-2022-34918", "cwe": { "id": "CWE-1025", "name": "Comparison Using Wrong Factors" }, "discovery_date": "2022-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104423" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the Linux kernel\u2019s Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in nft_set_elem_init()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "RHBZ#2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34918", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/", "url": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/" }, { "category": "external", "summary": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/" } ], "release_date": "2022-07-02T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-20T13:37:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6582" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.src", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64", "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.26.1.rt21.98.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap overflow in nft_set_elem_init()" } ] }
rhsa-2022:6610
Vulnerability from csaf_redhat
Published
2022-09-20 13:42
Modified
2025-07-25 18:55
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)
* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RDMA/mlx5: Fix number of allocated XLT entries (BZ#2092270)
* mlx5, Setup hanged when run test-route-nexthop-object.sh (BZ#2092535)
* many call traces from unchecked MSR access error: WRMSR to 0x199 in amazon i4.32xlarge instance (BZ#2099417)
* X86/platform/UV: Kernel Support Fixes for UV5 platform (BZ#2107732)
* block layer: fixes for md sync slow and softlockup at blk_mq_sched_dispatch_requests [9.0.0.z] (BZ#2111395)
* Fixes for NVMe/TCP dereferences an invalid, non-canonical pointer, kernel panic (BZ#2117755)
* Adding missing nvme fix to RHEL-9.1 (BZ#2117756)
* nvme/tcp mistakenly uses blk_mq_tag_to_rq(nvme_tcp_tagset(queue) (BZ#2118698)
* Important ice bug fixes (BZ#2119290)
* Power 9/ppc64le Incorrect Socket(s) & "Core(s) per socket" reported by lscpu command. (BZ#2121719)
Enhancement(s):
* lscpu does not show all of the support AMX flags (amx_int8, amx_bf16) (BZ#2108203)
* ice: Driver Update (BZ#2108204)
* iavf: Driver Update (BZ#2119477)
* i40e: Driver Update (BZ#2119479)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: heap overflow in nft_set_elem_init() (CVE-2022-34918)\n\n* kernel: vulnerability of buffer overflow in nft_set_desc_concat_parse() (CVE-2022-2078)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RDMA/mlx5: Fix number of allocated XLT entries (BZ#2092270)\n\n* mlx5, Setup hanged when run test-route-nexthop-object.sh (BZ#2092535)\n\n* many call traces from unchecked MSR access error: WRMSR to 0x199 in amazon i4.32xlarge instance (BZ#2099417)\n\n* X86/platform/UV: Kernel Support Fixes for UV5 platform (BZ#2107732)\n\n* block layer: fixes for md sync slow and softlockup at blk_mq_sched_dispatch_requests [9.0.0.z] (BZ#2111395)\n\n* Fixes for NVMe/TCP dereferences an invalid, non-canonical pointer, kernel panic (BZ#2117755)\n\n* Adding missing nvme fix to RHEL-9.1 (BZ#2117756)\n\n* nvme/tcp mistakenly uses blk_mq_tag_to_rq(nvme_tcp_tagset(queue) (BZ#2118698)\n\n* Important ice bug fixes (BZ#2119290)\n\n* Power 9/ppc64le Incorrect Socket(s) \u0026 \"Core(s) per socket\" reported by lscpu command. (BZ#2121719)\n\nEnhancement(s):\n\n* lscpu does not show all of the support AMX flags (amx_int8, amx_bf16) (BZ#2108203)\n\n* ice: Driver Update (BZ#2108204)\n\n* iavf: Driver Update (BZ#2119477)\n\n* i40e: Driver Update (BZ#2119479)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6610", "url": "https://access.redhat.com/errata/RHSA-2022:6610" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2096178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178" }, { "category": "external", "summary": "2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6610.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-07-25T18:55:54+00:00", "generator": { "date": "2025-07-25T18:55:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.4" } }, "id": "RHSA-2022:6610", "initial_release_date": "2022-09-20T13:42:34+00:00", "revision_history": [ { "date": "2022-09-20T13:42:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-20T13:42:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-25T18:55:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:9::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 9)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.26.1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "product": { "name": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "product_id": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.26.1.el9_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.26.1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product": { "name": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product_id": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.26.1.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.26.1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "product": { "name": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "product_id": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.26.1.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.26.1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:5.14.0-70.26.1.el9_0.s390x", "product": { "name": "perf-0:5.14.0-70.26.1.el9_0.s390x", "product_id": "perf-0:5.14.0-70.26.1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@5.14.0-70.26.1.el9_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:5.14.0-70.26.1.el9_0.src", "product": { "name": "kernel-0:5.14.0-70.26.1.el9_0.src", "product_id": "kernel-0:5.14.0-70.26.1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@5.14.0-70.26.1.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "product": { "name": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "product_id": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.26.1.el9_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "product": { "name": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "product_id": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.26.1.el9_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.src", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)", "product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.src", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch" }, "product_reference": "kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)", "product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-2078", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-06-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2096178" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in nft_set_desc_concat_parse()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2078" }, { "category": "external", "summary": "RHBZ#2096178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2078", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2078" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2078" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/nf_tables_api.c?id=fecf31ee395b0295f2d7260aa29946b7605f7c85" } ], "release_date": "2022-05-31T06:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-20T13:42:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:6610" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in nft_set_desc_concat_parse()" }, { "acknowledgments": [ { "names": [ "Arthur Mongodin" ], "organization": "RandoriSec" } ], "cve": "CVE-2022-34918", "cwe": { "id": "CWE-1025", "name": "Comparison Using Wrong Factors" }, "discovery_date": "2022-07-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104423" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow flaw was found in the Linux kernel\u2019s Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in nft_set_elem_init()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "RHBZ#2104423", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104423" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-34918", "url": "https://www.cve.org/CVERecord?id=CVE-2022-34918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34918" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/", "url": "https://lore.kernel.org/netdev/20220702115948.5de8b1e0@kernel.org/T/" }, { "category": "external", "summary": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/" } ], "release_date": "2022-07-02T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-20T13:42:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2022:6610" }, { "category": "workaround", "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.src", "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.26.1.el9_0.noarch", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.26.1.el9_0.x86_64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.aarch64", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.ppc64le", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.s390x", "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.26.1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap overflow in nft_set_elem_init()" } ] }
gsd-2022-34918
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-34918", "description": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "id": "GSD-2022-34918", "references": [ "https://www.suse.com/security/cve/CVE-2022-34918.html", "https://www.debian.org/security/2022/dsa-5191", "https://advisories.mageia.org/CVE-2022-34918.html", "https://ubuntu.com/security/CVE-2022-34918", "https://access.redhat.com/errata/RHSA-2022:6582", "https://access.redhat.com/errata/RHSA-2022:6592", "https://access.redhat.com/errata/RHSA-2022:6610" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-34918" ], "details": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "id": "GSD-2022-34918", "modified": "2023-12-13T01:19:18.739595Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-34918", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "name": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u", "refsource": "MISC", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u" }, { "name": "https://www.openwall.com/lists/oss-security/2022/07/02/3", "refsource": "MISC", "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "name": "[oss-security] 20220705 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "name": "https://www.randorisec.fr/crack-linux-firewall/", "refsource": "MISC", "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "name": "DSA-5191", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5191" }, { "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "name": "https://security.netapp.com/advisory/ntap-20220826-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "name": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "name": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.15.54", "versionStartIncluding": "5.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.18.11", "versionStartIncluding": "5.16", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.10.130", "versionStartIncluding": "5.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.4.244", "versionStartIncluding": "4.20", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.284", "versionStartIncluding": "4.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.14.316", "versionStartIncluding": "4.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-34918" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-843" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "name": "https://www.openwall.com/lists/oss-security/2022/07/02/3", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "name": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u", "refsource": "MISC", "tags": [ "Exploit", "Mailing List", "Vendor Advisory" ], "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452@randorisec.fr/T/#u" }, { "name": "[oss-security] 20220705 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "name": "https://www.randorisec.fr/crack-linux-firewall/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "name": "DSA-5191", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5191" }, { "name": "[oss-security] 20220806 Re: Linux kernel: Netfilter heap buffer overflow in nft_set_elem_init", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "name": "https://security.netapp.com/advisory/ntap-20220826-0004/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "name": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "name": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-12T19:39Z", "publishedDate": "2022-07-04T21:15Z" } } }
fkie_cve-2022-34918
Vulnerability from fkie_nvd
Published
2022-07-04 21:15
Modified
2024-11-21 07:10
Severity ?
Summary
An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2022/07/05/1 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2022/08/06/5 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6 | Mailing List, Patch, Vendor Advisory | |
cve@mitre.org | https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u | ||
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220826-0004/ | Third Party Advisory | |
cve@mitre.org | https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory | |
cve@mitre.org | https://www.openwall.com/lists/oss-security/2022/07/02/3 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.randorisec.fr/crack-linux-firewall/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/07/05/1 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/06/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6 | Mailing List, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220826-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5191 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.openwall.com/lists/oss-security/2022/07/02/3 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.randorisec.fr/crack-linux-firewall/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
debian | debian_linux | 11.0 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 20.04 | |
canonical | ubuntu_linux | 22.04 | |
netapp | h300s_firmware | - | |
netapp | h300s | - | |
netapp | h500s_firmware | - | |
netapp | h500s | - | |
netapp | h700s_firmware | - | |
netapp | h700s | - | |
netapp | h410s_firmware | - | |
netapp | h410s | - | |
netapp | h410c_firmware | - | |
netapp | h410c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "708B805D-F1B9-410C-8231-CD62F16F5739", "versionEndExcluding": "4.14.316", "versionStartIncluding": "4.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9112EE64-11F4-46DB-A041-95118F20F81B", "versionEndExcluding": "4.19.284", "versionStartIncluding": "4.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F47095-8BA3-495A-AED3-2CCA5F2838E6", "versionEndExcluding": "5.4.244", "versionStartIncluding": "4.20", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BF24898-7C80-443F-93F3-F82029BBFF72", "versionEndExcluding": "5.10.130", "versionStartIncluding": "5.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2197EF1-3D9C-4EBA-9F94-6C8668E719B6", "versionEndExcluding": "5.15.54", "versionStartIncluding": "5.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "622F881E-3317-4653-9558-86008C2FBFD2", "versionEndExcluding": "5.18.11", "versionStartIncluding": "5.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c." }, { "lang": "es", "value": "Se ha detectado un problema en el kernel de Linux versiones hasta 5.18.9. Un error de confusi\u00f3n de tipos en la funci\u00f3n nft_set_elem_init (conllevando a un desbordamiento del b\u00fafer) podr\u00eda ser usado por un atacante local para escalar privilegios, una vulnerabilidad diferente a la de CVE-2022-32250. (El atacante puede obtener acceso de root, pero debe comenzar con un espacio de nombres de usuario no privilegiado para obtener acceso CAP_NET_ADMIN). Esto puede corregirse en la funci\u00f3n nft_setelem_parse_data en el archivo net/netfilter/nf_tables_api.c" } ], "id": "CVE-2022-34918", "lastModified": "2024-11-21T07:10:26.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-04T21:15:07.730", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "source": "cve@mitre.org", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5191" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.randorisec.fr/crack-linux-firewall/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/168543/Netfilter-nft_set_elem_init-Heap-Overflow-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/07/05/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/06/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e6bc1f6cabcd30aba0b11219d8e01b952eacbb6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lore.kernel.org/netfilter-devel/cd9428b6-7ffb-dd22-d949-d86f4869f452%40randorisec.fr/T/#u" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220826-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2022/07/02/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.randorisec.fr/crack-linux-firewall/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…